Chapter 3. Vulnerability Assessment Tools

Introduction

In the first few chapters of this book, we outlined the higher-level concepts of vulnerability management and vulnerability assessment. Chapter 2 in particular outlined the various methods for performing vulnerability assessments as well as the pros and cons of each method. In this chapter, we will explain and demonstrate the different tools available for performing vulnerability assessments. Our goal is not to recommend a specific tool, but rather to provide examples from the ...

Get The Best Damn IT Security Management Book Period now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.