Module 3

Vulnerabilities and vulnerability scanning

A vulnerability is a weakness or flaw in a computer system, software application, network infrastructure or really any component of a computer/network environment that can be exploited.  Vulnerabilities are not just only within code, but it could be in a design flaw or misconfiguration or just bad security practices. 

When a vulnerability exists this provides an entry point for an attacker. When a vulnerability is exploited an attacker is able to gain unauthorized access. They might then be able to manipulate data on the systems, compromise other systems, disrupt operations and even plant a method for them to easily return (a backdoor). 

In this module we will learn how vulnerabilities are tracked, how to do a vulnerability scan and how to read the results.