Enterprise Vulnerability Management - Assessing, Implementing, and Maintaining
Offered By: YouTube
Course Description
Overview
Learn about enterprise vulnerability management in this 50-minute conference talk from Circle City Con 5.0. Explore the fundamentals of vulnerability assessment, implementation, and maintenance. Gain insights into installation processes, documentation best practices, and the Capability Maturity Model (CMM). Discover the pros and cons of outsourcing, understand effective scanning techniques, and delve into the role of social engineering in vulnerability management. Conclude with a Q&A session to address specific concerns and deepen your understanding of this critical aspect of cybersecurity.
Syllabus
Intro
The Basics
Vulnerability Management
Install vs Implementation
Documentation
CMM
Outsource
Scanning
Social Engineering
Questions
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network