Vulnerability Assessment Tools
In this chapter you will learn:
• When and how you can use different tools and technologies
• How to choose among similar tools and technologies
• How to review and interpret results of vulnerability scan reports
• How to use vulnerability assessment tools for specialized environments
We shape our tools and thereafter our tools shape us.
—Father John Culkin
The purpose of this chapter is to introduce you to (or perhaps reacquaint you with) vulnerability assessment tools with which you will need to be familiar for the CySA+ exam. We are not trying to provide a full review of each tool or even cover all the features. Instead, we give you enough information to help you understand the purpose of ...