Course Overview
1.0: Threats, Attacks, and Vulnerabilities
Section 1.0: Test Your Knowledge
Section 1.0: Identifying Scenario & Questions
2.0: Technologies and Tools
Section 2.0: Test Your Knowledge
Section 2.0: Identifying Scenario & Questions
3.0: Architecture and Design
1 of 3

1.5.4 Identify common misconfigurations

TERM

DEFINITION

LAYMAN'S TERM

Identify Common Misconfigurations

Identify shared or guest access to a network, open ports and unused credentials.

Identifying common misconfiguration is done when vulnerability scanning is processed.

We Don't Want You TO GO!

Try a couple of our sample lessons. This is our gift to you!

Take A Jab At It!

Test Your Skills
Free Today!

If you don’t do well on this FREE quiz we just ask you come back and let us help you learn and gain your Certification.