I'm kind of a veteran of the dental clinic, so let me step in with some info. Between my sophomore year of undergrad and my 2nd year of grad school I've had 3 wisdom teeth extracted, 3 crowns (start-to-finish), 1 root canal, 6 fillings, 4 tooth sealants, and 1 night guard done at the student clinic. The #1 pro to the student clinic is that prices are dirt cheap compared to anywhere else, and even better if you have insurance covering part of it. The main con is that services take usually about twice as long as the normal dentist. On your first visit you will be seen by a dental hygienest in the screening clinic. They will do a general assessment, plaque score, cleaning, etc. and give you a general idea of the health of your teeth and gums. If they recommend that you get some work done you will then need to be assigned to a dental student. Keep in mind that students do graduate, so if you go here over a long period of time you might have different dentists. However, as long as the student is still there, they'll be the only person you see.
This includes discovering infrastructure and applications, performing security research, and doing vulnerability discovery. Intrigue also allows enriching available data and perform OSINT research (open source intelligence). The related scans include DNS subdomain brute-forcing, email harvesting, IP geolocation, port scanning, and using public search engines like Censys, Shodan, and Bing. OpenVAS (vulnerability scanner) penetration testing, security assessment, vulnerability scanning OpenVAS is a framework of several services and tools offering a vulnerability scanning and vulnerability management solution. Prowler (vuln) (distributed vulnerability scanner) security assessment, vulnerability scanning, vulnerability testing A vulnerability scanner like Prowler can be used to scan the network for vulnerabilities. Prowler can perform active network scanning and uses fingerprinting. Part of the process it to test for default or weak credentials. Safety (vulnerability scanner for software dependencies) penetration testing, security assessment, security monitoring, vulnerability scanning When having applications deployed in your environment, not all of those may be installed via a package manager.