THREAT AND VULNERABILITY MANAGEMENT
1. Network Vulnerability Management
2. Operating System Vulnerability Management
3. Applications Vulnerability Management
4. Database Vulnerability Management
5. Identity Exposure
6. Desktop Vulnerability Management