August 2018
Intermediate to advanced
254 pages
6h 20m
English
In this chapter, we became familiar with some absolute security basics and some of the essential governance concepts for building a vulnerability management program. In the next chapter, we'll learn how to set up an environment for performing vulnerability assessments.
Read now
Unlock full access