Implementing a Vulnerability Management Lifecycle
Offered By: LinkedIn Learning
Course Description
Overview
Get a step-by-step process for finding, prioritizing, and mitigating the vulnerabilities in your computing environment, no matter what technology stack you're running.
Syllabus
Introduction
- Everyone needs a vulnerability management program
- What you should know
- Defining vulnerability management
- The benefits of vulnerability management
- Succeed by setting program goals
- Make a great business case
- Assign qualified people
- Step 1 case study
- Creating the right core process
- How to discover known vulnerabilities
- Generating actionable vulnerability reports
- Validate reported vulnerabilities
- Step 2 case study
- How to design effective mitigations
- How to fix vulnerabilities
- How to verify mitigation success
- Step 3 case study
- Next steps
Taught by
Kip Boyle
Related Courses
The Foundations of CybersecurityUniversity System of Georgia via Coursera Introduction to Cybersecurity
SecurityScoreCard via Udacity TOTAL: CompTIA CySA+ Cybersecurity Analyst (CS0-003)
Udemy Fundamentals of Internet Security | Secure Your Environment
Udemy Ciberseguridad en linea
Udemy