There are lots of prerequisites before one can actually start a vulnerability assessment for an infrastructure. In this chapter, we tried to cover all such prerequisites in brief. From the next chapter onward, we will be dealing with the actual vulnerability assessment methodology.