Course Overview
1.0: Threats, Attacks, and Vulnerabilities
Section 1.0: Test Your Knowledge
Section 1.0: Identifying Scenario & Questions
2.0: Technologies and Tools
Section 2.0: Test Your Knowledge
Section 2.0: Identifying Scenario & Questions
3.0: Architecture and Design
1 of 3

1.5.4 Identify common misconfigurations

TERM

DEFINITION

LAYMAN'S TERM

Identify Common Misconfigurations

Identify shared or guest access to a network, open ports and unused credentials.

Identifying common misconfiguration is done when vulnerability scanning is processed.