In this video you will learn about cyber threat hunting aspects such as: intelligence fusion, threat feeds, & security advisories & bulletins. Also you will learn about various aspects of vulnerability scans such as: false positives, false negatives, log reviews, credentialed vs. non-credentialed scans, intrusive vs. non-intrusive scans, application scanners, web application scanners, network scanners, & the Common Vulnerability Scoring System.