10 hours 55 minutes

Video Transcription

everyone, welcome back to the core. So in this particular lab you're going to be using and mapping open Voss again so you'll be identifying different systems with end map. And then you'll be performing a vulnerability scan on those systems using open Voss, and you'll also be doing some reporting at the end of the lab
again. As always on these particular labs and this course, you just want to make sure you're checking the box on the right side here as you go through the instructions. So that way, you get full credit for the lab once your complete
and if you haven't already done a little two step by step guides, be sure to do that from the resource section of the course, or you can also just follow along with the instructions on the right side of the lab itself.

Up Next

Fundamentals of Vulnerability Management

Most of the successful attacks through a business network could be prevented with vulnerability management. This course focuses on what you can do to automatically manage vulnerabilities and keep your network safe from attack.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor