Vulnerability Assessment

In the previous chapter, we learned about various aspects of security IT infrastructure, including monitoring and responding to incidents, threat detection, and diverting attackers.

In today's digital world, information is accessed, stored, and transferred electronically. The security of this information and the systems storing it are critical to companies' reputations, as well as for providing a better user experience. Consequently, the need to analyze and remediate vulnerabilities from IT infrastructure have become the most important tasks for any security expert, system admin, or network administrator. Even if an organization has a well-managed security infrastructure in place such as a firewall, antivirus, and ...

Get Practical Network Scanning now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.