YoVDO

Implementing a Vulnerability Management Lifecycle

Offered By: LinkedIn Learning

Tags

Vulnerability Management Courses Cybersecurity Courses Network Security Courses Risk Assessment Courses Threat Detection Courses Vulnerability Scanning Courses

Course Description

Overview

Get a step-by-step process for finding, prioritizing, and mitigating the vulnerabilities in your computing environment, no matter what technology stack you're running.

Syllabus

Introduction
  • Everyone needs a vulnerability management program
  • What you should know
1. Prepare for Vulnerability Management
  • Defining vulnerability management
  • The benefits of vulnerability management
2. Create the Vulnerability Management Program
  • Succeed by setting program goals
  • Make a great business case
  • Assign qualified people
  • Step 1 case study
3. Conduct Weekly Vulnerability Scans
  • Creating the right core process
  • How to discover known vulnerabilities
  • Generating actionable vulnerability reports
  • Validate reported vulnerabilities
  • Step 2 case study
4. Mitigate Found Vulnerabilities
  • How to design effective mitigations
  • How to fix vulnerabilities
  • How to verify mitigation success
  • Step 3 case study
Conclusion
  • Next steps

Taught by

Kip Boyle

Related Courses

Windows Server 2016 Security Features
Microsoft via edX
Detecting and Mitigating Cyber Threats and Attacks
University of Colorado System via Coursera
Threat Detection: Planning for a Secure Enterprise
Microsoft via edX
Microsoft Professional Capstone : Cybersecurity
Microsoft via edX
Cyber Security Operations (Cisco CCNA)
The Open University via FutureLearn