【文件属性】:
文件名称:Asset Attack Vectors--2018
文件大小:7.69MB
文件格式:PDF
更新时间:2021-07-07 10:02:14
Management Strategy Attack Vector
What You’ll Learn
Create comprehensive assessment and risk identification policies and procedures
Implement a complete vulnerability management workflow in nine easy steps
Understand the implications of active, dormant, and carrier vulnerability states
Develop, deploy, and maintain custom and commercial vulnerability management programs
Discover the best strategies for vulnerability remediation, mitigation, and removal
Automate credentialed scans that leverage least-privilege access principles
Read real-world case studies that share successful strategies and reveal potential pitfalls