O'Reilly logo

CompTIA Security+ SY0-401 In Depth by Mark Ciampa

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

chapter 15Vulnerability Assessment

After completing this chapter, you should be able to do the following:

• Define vulnerability assessment and explain why it is important

• Explain the differences between vulnerability scanning and penetration testing

• Describe the security implications of integration with third parties

• List techniques for mitigating and deterring attacks

Today’s Attacks and Defenses

A wild-goose chase is a figurative term for a lengthy and useless pursuit that ends in frustration. Used as far back as William Shakespeare in his play Romeo and Juliet, the phrase rarely comes to mind when thinking about defending against attacks directed at information technology (IT) resources. But one company is now specializing in leading ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required