August 2018
Intermediate to advanced
254 pages
6h 20m
English
The following are the types of vulnerability assessments that simulate exposure from an attacker's point of view, based on the attacker's knowledge of the environment/infrastructure.
Read now
Unlock full access