Identification Methods
This section explores a range of cybersecurity methods, from traditional scans, such as vulnerability scans and penetration scans, to gathering threat intelligence data and monitoring the dark web, providing us with a comprehensive guide to identifying threats and vulnerabilities. This information is detailed in the following sections.
Vulnerability Scans
Scanning involves systematically probing systems and networks for vulnerabilities. Vulnerability scanning tools identify weaknesses in software, configurations, or hardware that can be exploited by cyber attackers. Regular scans are essential for maintaining a strong security posture.
There are two types of vulnerability scans, non-credentialed and credentialed. The CompTIA Security+ 701 examination requires that you have a good knowledge of each as these are usually heavily tested.
A non-credentialed scan operates with restricted privileges and can only identify vulnerabilities that are visible...