VA

  1. Identify Vulnerabilities
  2. Assess Vulnerabilities # Evaluating the potential impact of each vulnerability and assigning a risk score.
  3. Treat Vulnerabilities

know what you want to do and how much will you go or do it.

02 Perform a Risk Assessment & Threat Modelling

Determine threats to the system, and find weaknesses that could be exploited by threats

03 Know the physical and logical assets in scope

Discovery phase e.g Identify hardware components like servers, routers, switches, and endpoint devices etc.

04 Scan the assets

05 Validate the findings 06 Prepare a Remediation Plan 07 Reporting to the Senior Management 08 Repeat the Cycle every three months or as per your business requirements or after every major change 09 Keep comparing the data and learn to measure your VA program and Follow CMMI

Untitled

Hacking 101 & Incident Response + Network Pent: