This is a dedicated watch page for a single video.
The boss has tasked you with testing the company's network from the attacker's perspective to identify accessible exploits and vulnerabilities in devices like firewalls, routers, and servers. This process will also involve assessing the threat of external network security attacks. What type of vulnerability assessment should you perform?