CHAPTER 16

Threat and Vulnerability Discovery

In this chapter, you will

     •   Explore threat and vulnerability discovery methods

     •   Learn how to interpret results of security assessment tools

     •   Understand the use of appropriate tools and techniques to discover security threats and vulnerabilities

     •   Learn the differences between penetration testing and vulnerability scanning

A wide range of security tools and techniques can be employed to examine what is happening on a network and the servers connected by it. Learning how to use the appropriate tools and techniques to discover security threats and vulnerabilities is an important part of a security professional’s job.

Interpret Results of Security Assessment Tools

Learning ...

Get CompTIA Security+ All-in-One Exam Guide, Fourth Edition (Exam SY0-401), 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.