Content from Mitko Katsev
What is the difference between doing a vulnerability assessment for a fitness tracker and an internet-connected pacemaker? Quite significant! Simple scanning may be sufficient in some cases, but others require a deeper look. In this path, you’ll learn a variety of ways to discover vulnerabilities, classify and prioritize vulnerabilities based on real-world criticality measures, define the actual risk of the vulnerabilities, create and execute an actionable remediation plan, and document and maintain a vulnerability assessment. Finally, you’ll learn some key security controls that don’t target specific vulnerabilities, but enhance the overall security of your system.