Vulnerability Management with QRadar
Offered By: Pluralsight
Course Description
Overview
This course is designed to help you deploy a proper vulnerability management program using the IBM QRadar Vulnerability Management (QVM), a solution that allows you to scan your company for vulnerabilities directly from the QRadar console.
One of the main advantages of using QRadar is its variety of features in one single solution. In this course, Vulnerability Management with QRadar, you'll learn how to use the tool to detect vulnerabilities in your environment and correlate them with other information in your SIEM, such as events and flows. First, you'll learn how to identify the scope of a scan and how to work with the stakeholders to properly schedule a scan. Next, you'll be shown how to configure the scans on the tool and how to run them. Then, you'll explore the process of creating a vulnerability remediation plan, in which you'll prioritize the vulnerabilities according to your company needs. Finally, you'll discover how to investigate critical vulnerabilities and how to identify signs of exploitation. When you're finished with this course, you'll have the skills and knowledge of QVM needed to implement and run a vulnerability management program in your IBM QRadar environment.
One of the main advantages of using QRadar is its variety of features in one single solution. In this course, Vulnerability Management with QRadar, you'll learn how to use the tool to detect vulnerabilities in your environment and correlate them with other information in your SIEM, such as events and flows. First, you'll learn how to identify the scope of a scan and how to work with the stakeholders to properly schedule a scan. Next, you'll be shown how to configure the scans on the tool and how to run them. Then, you'll explore the process of creating a vulnerability remediation plan, in which you'll prioritize the vulnerabilities according to your company needs. Finally, you'll discover how to investigate critical vulnerabilities and how to identify signs of exploitation. When you're finished with this course, you'll have the skills and knowledge of QVM needed to implement and run a vulnerability management program in your IBM QRadar environment.
Syllabus
- Course Overview 1min
- Planning and Identifying Targets 14mins
- Configuring and Running Scans 25mins
- Analyzing the Results and Reporting 16mins
- Remediating Vulnerabilities 15mins
- Vulnerabilities Investigation 18mins
Taught by
Ricardo Reimao
Related Courses
FinTech for Finance and Business LeadersACCA via edX Access Controls
(ISC)² via Coursera Advanced Cyber Security Training
EC-Council via FutureLearn Python для кибербезопасности. Финальный проект
E-Learning Development Fund via Coursera Advanced System Security Design
University of Colorado System via Coursera