YoVDO

Master Vulnerability Management

Offered By: LinkedIn Learning

Tags

Cybersecurity Courses Ethical Hacking Courses Wireshark Courses Nmap Courses Risk Assessment Courses Nessus Courses Vulnerability Analysis Courses Security Testing Courses Vulnerability Management Courses

Course Description

Overview

Managing vulnerabilities in your computing infrastructure is a critical success factor for blocking cyberattacks. In this learning path, discover how to find, prioritize, and fix vulnerabilities, as well as allocate your limited budget to manage seemingly unlimited cyber risks.
  • Set a productive cadence for finding vulnerabilities.
  • Automate your work with a vulnerability scanner.
  • Assess the risk of a vulnerability and select a resolution.

Syllabus

  • Course 1: Implementing a Vulnerability Management Lifecycle
    • Get a step-by-step process for finding, prioritizing, and mitigating the vulnerabilities in your computing environment, no matter what technology stack you're running.
  • Course 2: Learning Vulnerability Management
    • Learn the basics of vulnerability management. Discover why vulnerabilities exist, as well as how to manage them from start to finish.
  • Course 3: Security Testing Essential Training
    • Learn about security testing. Learn how to set up a test environment, plan assessments, identify targets, and execute security tests with popular tools like Nmap and Wireshark.
  • Course 4: Security Testing: Vulnerability Management with Nessus
    • Fix the flaws in your network before attackers can find them. Learn how to use Nessus, the network automated vulnerability scanner, to detect and resolve system vulnerabilities.
  • Course 5: Ethical Hacking: Vulnerability Analysis
    • Manage risk by assessing vulnerabilities. Learn about the processes, methodologies, and tools you need to find and address weaknesses that attackers might exploit.
  • Course 6: Vulnerability Management: Assessing the Risks with CVSS v3.1
    • Prioritize the vulnerabilities in your environment using the Common Vulnerability Scoring System (CVSS). Learn how to apply CVSS scores to effectively assess risk.

Taught by

Kip Boyle, Lora Vaughn, Jerod Brennen, Mike Chapple, Lisa Bock and Lora Vaughn

Related Courses

Web Application Ethical Hacking - Penetration Testing Course for Beginners
freeCodeCamp
CompTIA PenTest+ (PT0-001): 2 Survey the Target
LinkedIn Learning
CompTIA PenTest+ (PT0-001): 5 Selecting Pen Testing Tools
LinkedIn Learning
Ethical Hacking: Scanning Networks
LinkedIn Learning
Improve Your Application Security Testing Skills
LinkedIn Learning