Module 5 – Vulnerability Identification Phase II Controls Assessment Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability Identification.