YoVDO

Master Vulnerability Management

Offered By: LinkedIn Learning

Tags

Vulnerability Management Courses Cybersecurity Courses Network Security Courses Ethical Hacking Courses Risk Assessment Courses System Administration Courses Nessus Courses Security Testing Courses

Course Description

Overview

Managing vulnerabilities in your computing infrastructure is a critical success factor for blocking cyberattacks. In this learning path, discover how to find, prioritize, and fix vulnerabilities, as well as allocate your limited budget to manage seemingly unlimited cyber risks.
  • Set a productive cadence for finding vulnerabilities.
  • Automate your work with a vulnerability scanner.
  • Assess the risk of a vulnerability and select a resolution.

Syllabus

Courses under this program:
Course 1: Implementing a Vulnerability Management Lifecycle
-Get a step-by-step process for finding, prioritizing, and mitigating the vulnerabilities in your computing environment, no matter what technology stack you're running.

Course 2: Learning Vulnerability Management
-Learn the basics of vulnerability management. Discover why vulnerabilities exist, as well as how to manage them from start to finish.

Course 3: Security Testing Essential Training
-Learn about security testing. Learn how to set up a test environment, plan assessments, identify targets, and execute security tests with popular tools like Nmap and Wireshark.

Course 4: Security Testing: Vulnerability Management with Nessus
-Fix the flaws in your network before attackers can find them. Learn how to use Nessus, the network automated vulnerability scanner, to detect and resolve system vulnerabilities.

Course 5: Ethical Hacking: Vulnerability Analysis
-Manage risk by assessing vulnerabilities. Learn about the processes, methodologies, and tools you need to find and address weaknesses that attackers might exploit.

Course 6: Vulnerability Management: Assessing the Risks with CVSS v3.1
-Prioritize the vulnerabilities in your environment using the Common Vulnerability Scoring System (CVSS). Learn how to apply CVSS scores to effectively assess risk.


Courses

  • 0 reviews

    1 hour 46 minutes

    View details
    Fix the flaws in your network before attackers can find them. Learn how to use Nessus, the network automated vulnerability scanner, to detect and resolve system vulnerabilities.
  • 0 reviews

    1 hour 14 minutes

    View details
    Prioritize the vulnerabilities in your environment using the Common Vulnerability Scoring System (CVSS). Learn how to apply CVSS scores to effectively assess risk.
  • 0 reviews

    55 minutes

    View details
    Learn the basics of vulnerability management. Discover why vulnerabilities exist as well as how to manage them from start to finish.
  • 0 reviews

    3 hours 27 minutes

    View details
    Learn about security testing. Learn how to set up a test environment, plan assessments, identify targets, and execute security tests with popular tools like Nmap and Wireshark.
  • 0 reviews

    1-2 hours

    View details
    Manage risk by assessing vulnerabilities. Learn about the processes, methodologies, and tools you need to find and address weaknesses that attackers might exploit.
  • 0 reviews

    View details
    Get a step-by-step process for finding, prioritizing, and mitigating the vulnerabilities in your computing environment, no matter what technology stack you're running.

Taught by

Kip Boyle, Lora Vaughn, Jerod Brennen, Mike Chapple and Lisa Bock

Related Courses

Web and Mobile Testing with Selenium
University of Minnesota via Coursera
DevOps Pipeline: Automatización hasta el despliegue
Universidad Anáhuac via edX
Programming Foundations: Software Testing/QA
LinkedIn Learning
Security Assessment and Testing for CISSP®

Pluralsight
EU Panel: The Joys of Integrating Security Testing into Your Pipeline
Pluralsight