Developing and Implementing Vulnerability Management Programs

This course is for Security Managers & CISOs to create, run, and manage their VM program effectively. This course deals with handling vulnerability management, compliance management, risk management, and VAPT in a single integrate framework.
Course info
Level
Advanced
Updated
Oct 4, 2019
Duration
1h 21m
Table of contents
Description
Course info
Level
Advanced
Updated
Oct 4, 2019
Duration
1h 21m
Description

Developing a vulnerability management program is as much a challenge as implementing the same. In this course, Developing and Implementing Vulnerability Management Programs, you will learn to quickly design, implement, measure, and enhance your vulnerability management program based on the needs of your organization. First, you will learn to define a VM framework, then develop our VM program. Next, you will discover how to implementing the VAPT and patch management activities. Finally, you will define the KPIs for monitoring the performance of the VM program. When you are finished with this course, you will be able to design a VM program for an organization of any size or vertical.

About the author
About the author

Cyber Security professional with experience of working as consultant, Appsec, SecOps and Compliance Management. I have experience in Web and Mobile App Pentesting, Cryptography, ISO 27001, Network security and Security Engineering

Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi everyone. My name is Prashant Pandey, and welcome to my course Developing and Implementing Vulnerability Management Programs. I am a security consultant, penetration tester, and an ISO 27001 lead auditor. Are you having sleepless thoughts on how to design, plan, test, and implement your vulnerability management program? Are you worried how your vulnerability management program fits into your overall risk management and compliance framework? If yes, then this course will guide you on how to create and run a vulnerability management program. In this course, we are going to start by deciding the expectations, scope, and requirements from our vulnerability management program. Then we will dive into some detailed topics like vulnerability assessments and penetration testing, remediation, and implementing compensatory controls. We will also discuss some KPIs that can help you evaluate the efficiency of your vulnerability management program. By the end of this course, you will know how to design and implement vulnerability management programs for any large to small organization. Before beginning this course, you should be familiar with basic concepts of VAPT, security controls assessments, and security operations. I hope you'll join me on this journey to learn vulnerability management with the developing and implementing vulnerability management program course at Pluralsight.