Security School

Browse Sections

BACKGROUND IMAGE: iSTOCK/GETTY IMAGES

Performing an authenticated vulnerability scan

Last updated:August 2014

Editor's note

Running vulnerability assessments and scans are critical enterprises practices that will help security teams not only find weaknesses and points of failure but also ensure the correct patches and updates are made.

While many organizations perform vulnerability scans, they often only run external or unauthenticated scans, omitting the other side of the vulnerability scanning equation: authenticated vulnerability scans.

This Security School lesson featuring information security expert Kevin Beaver offers guidance on how to perform an authenticated vulnerability scan to complete your vulnerability management program, as well as the truths behind many authenticated vulnerability scanning misconceptions.

Watch the video, listen to the podcast, read the tech tip then take the quiz to see how much you have learned. Passing the quiz earns you one CPE credit from (ISC)².

View our Security School Course Catalog to view more lessons eligible for CPE credits.

About the presenter: Kevin Beaver is an information security consultant, writer, professional, speaker and expert witness with Atlanta-based Principle Logic LLC. With more than 25 years of experience in the industry, Kevin specializes in performing independent security vulnerability assessments of network systems, as well as Web and mobile applications.

1Test your authenticated vulnerability scanning knowledge

After watching the video, reading the tip and listening to the podcast, test what you've learned about authenticated vulnerability scanning with this exclusive quiz.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close