# Vulnerability assessment ## Scanning concepts, authenticated vs unauthenticated ## Interpreting results, prioritisation ## Limitations and false positives/negatives