My Certification Notes

Home

❯

Definitions

❯

identification methods

identification methods

Mar 08, 20261 min read

threat maps vulnerability scans penetration testing responsible disclosure program bug bounty system and process audit threat intelligence threat feed proprietary closed source intelligence OSINT data sources dark web application security static analysis dynamic analysis package monitoring


Graph View

Backlinks

  • 4.3 Explain various activities associated with vulnerability management.

Created with Quartz v5 © 2026

  • GitHub
  • Discord Community