Security vulnerability scan

Preparation

Pre-Scan Activities

Network Vulnerability Scan

Web Application Vulnerability Scan

Operating System Vulnerability Scan

Post-Scan Activities

Remediation and Follow-up