Gathering information regarding network vulnerabilities is a critical step in thwarting potential exploits. Explore network reconnaissance and security policies, including logging, traffic intercepts, and hacking techniques.
Learning Objectives
{"explain how to discover network devices"}