- Securing Network Infrastructure
- Sairam Jetty Sagar Rahalkar
- 21字
- 2021-08-20 10:15:11
Flow of procedures
The activity of a Network Vulnerability Scan can be divided into three phases:
- Discovery
- Port scanning
- Vulnerability scanning
The activity of a Network Vulnerability Scan can be divided into three phases: