Chapter 6. Analyzing Scan Output and Identifying Common Vulnerabilities

This chapter covers the following topics:

2.0 Vulnerability Management

2.2 Given a scenario, analyze the output resulting from a vulnerability scan.

Image Analyze Reports from a Vulnerability Scan: Describes how to review and interpret scan results, including identifying false positives and false negatives and creating exceptions.

Image Validate Results and Correlate Other Data Points: Covers the validation process including comparison to best practices or compliance, reconciling results, ...

Get CompTIA Cybersecurity Analyst (CySA+) Cert Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.