O'Reilly logo

CompTIA Cybersecurity Analyst (CSA+) Cert Guide by Troy McMillan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5. Implementing an Information Security Vulnerability Management Process

This chapter covers the following topics:

2.0 Vulnerability Management

2.1 Given a scenario, implement an information security vulnerability management process

Image Identification of Requirements: Discusses the process of establishing the requirements of a vulnerability assessment.

Image Establish Scanning Frequency: Covers factors affecting scanning frequency, such as risk appetite, regulatory requirements, technical constraints, and workflow.

Configure Tools to Perform Scans ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required