TTC Vulnerability Analysis Basic Nessus Installation & Basic Commands Worksheet
Assignment 3 :
Defense Begins with Eliminating Vulnerabilities Defense
against attacks begins with elimination of vulnerabilities.
Vulnerabilities are exploited by attackers to gain access to a system.
Minimization of vulnerabilities is one of the foundational elements of
defense.
Obtain a copy of the nmap scanning tool. Explore the
various command-line options to scan networks, fingerprint operating
systems, and perform other network-mapping functions.Provide a
screenshot of your installation in the submission folder specified
“Nmap”. ( I uploaded the presentation file you might need it.