Define vulnerability assessment and explain why it is important
Explain the differences between vulnerability scanning and penetration testing
Describe the security implications of integration with third parties
List techniques for mitigating and deterring attacks