• Review vulnerability scanning tools, management processes, and identifying weaknesses across diverse environments like cloud and IoT.