Draft of Training Manual: Vulnerability Assessment
4.1 Significance of Vulnerability Assessment
Explain the significance of a vulnerability assessment as a core activity of network defense and cybersecurity. Be sure to define the term and use specific details and examples to illustrate its meaning in a business context.
Discuss the key functions of vulnerability scanning technologies.
Discuss some best practices around vulnerability scanning and assessment based on your research.
4.2 Vulnerability Assessment Tools and Methodology
Provide a summary of the key company-approved tools which are “Zen Map” and “Metasploit”. In your summary, identify the importance of and rationale for Zen Map and Metasploit.
Discuss how the Zen Map and Metasploit tools work to assess vulnerabilities in the network. Offer some examples.