TST 205 - Performing Vulnerability Scans
Performing vulnerability scans is a necessary first step to evaluating the security of an organization’s network and helping protect organizational data and assets; this includes assessing, mitigating, and reporting on any security vulnerabilities that exist in an organization’s systems and software.
- Enumerating Platforms, Software Flaws, and improper configurations
- Formatting Checklists and test procedures
- Measuring vulnerability impact
- Analyzing vulnerability scan reports and results from security control assessments