Watch this video on YouTube
What is typically the FIRST step in the vulnerability scanning methodology?