Course Overview
1.0: Threats, Attacks, and Vulnerabilities
Section 1.0: Test Your Knowledge
Section 1.0: Identifying Scenario & Questions
2.0: Technologies and Tools
Section 2.0: Test Your Knowledge
Section 2.0: Identifying Scenario & Questions
3.0: Architecture and Design
1 of 3

1.5.3 Identify lack of security controls




Identify Lack of Security Controls

Vulnerability scanning that looks for lack of firewalls and secure passwords antivirus, anti-spyware, etc.

Vulnerability scans are done to see how a system is weak to threats.