Table of Contents
- Vulnerability Management Governance
- Setting up the Assessment Environment
- Security Assessment Prerequisites
- Information Gathering
- Enumeration & Vulnerability Assessment
- Gaining Network Access
- Assessing Web Application Security
- Privilege Escalation
- Maintaining access & clearing tracks
- Vulnerability Scoring
- Threat Modeling
- Patching & Security Hardening
- Vulnerability Reporting and metrics

