CHAPTER 3

Vulnerability Management Activities

In this chapter you will learn:

•   The requirements for a vulnerability management process

•   How to determine the frequency of vulnerability scans to meet your needs

•   The types of vulnerabilities found in various systems

•   Considerations when configuring tools for scanning

Of old, the expert in battle would first make himself invincible and then wait for his enemy to expose his vulnerability.

—Sun Tzu

Like many other areas in life, vulnerability management involves a combination of things we want to do, things we should do, and things we have to do. Assuming you don’t need help with the first, we’ll focus our attention in this chapter on the latter two. First of all, we identify the requirements ...

Get CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide, Second Edition (Exam CS0-002), 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.