Workshop about the configuration and usage of a vulnerability scanner