Reading (Mandatory) – Ciampa Chapter 15

Assignment – Post to the Week 14 conference in Discussions to the left.


For computer networks, a vulnerability assessment is like a comprehensive inspection that you have done on your vehicle before a long trip. The purpose of a vulnerability assessment is to uncover both known and unknown application weaknesses. Vulnerability assessments are also useful for testing your incident response procedures. This chapter covers the basics of discovering vulnerabilities and the steps you can take to mitigate (protect) those vulnerabilities.

Chapter Objectives

  • Define vulnerability assessment and explain why it is important
  • Explain the differences between vulnerability scanning and penetration testing
  • Describe the security implications of integration with third parties
  • List techniques for mitigating and deterring attacks

"Get 15% discount on your first 3 orders with us"
Use the following coupon

Order Now