Book Content
chapters • 8h28m total length
1. Vulnerability Management Governance
2. Setting up the Assessment Environment
3. Security Assessment Prerequisites
4. Information Gathering
5. Enumeration & Vulnerability Assessment
6. Gaining Network Access
7. Assessing Web Application Security
8. Privilege Escalation
9. Maintaining access & clearing tracks
10. Vulnerability Scoring
11. Threat Modeling
12. Patching & Security Hardening
13. Vulnerability Reporting and metrics














