O'Reilly logo

GSEC GIAC Security Essentials Certification All-in-One Exam Guide by Ric Messier

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

image
11
Vulnerability Control
In this chapter, you will learn:
•  About discovering vulnerabilities
•  Strategies to manage vulnerabilities
•  Different types of Web vulnerabilities
image
A vulnerability is an identified weakness within a system or network. Vulnerabilities, though, can be mitigated using a number of systems or processes, so even though a vulnerability has been identified, something else may be in place to keep the vulnerability from being exploited. It’s worth knowing what the potential is, however, and then evaluating the probability of ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required