Vulnerability Management: The Big Picture

Information systems vulnerabilities expose networks to attack by threats, and potential loss to your organization. This course will teach you about a vulnerability management process that can help you identify, analyze, and patch vulnerabilities.
Course info
Rating
(18)
Level
Beginner
Updated
Sep 27, 2017
Duration
1h 37m
Table of contents
Description
Course info
Rating
(18)
Level
Beginner
Updated
Sep 27, 2017
Duration
1h 37m
Description

Keeping an information system secure is an essential and continual process to stop potential threats. In this course, Vulnerability Management: The Big Picture, you'll learn the vulnerability management process and how it fits into an information security plan. First, you'll discover the importance of conducting regular vulnerability scans. Next, you'll explore how to prioritize vulnerability remediation. Finally, you'll delve into some tools that are available to help you automate these processes. By the end of this course, you'll have developed a deeper understanding of the basics of the vulnerability management process and the importance of its implementation.

About the author
About the author

Matt Glass is a Multi-national Systems Integrator in Stuttgart, Germany, working as a government contractor. He has been working in the IT field for the last eight years.

More from the author
Lateral Movement with WMIOps
Intermediate
24m
Sep 25, 2020
Command and Control with Pupy
Intermediate
25m
Sep 25, 2020
Lateral Movement with PsExec
Intermediate
21m
Sep 25, 2020
More courses by Matt Glass
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
[Autogenerated] Hello, everyone. I'm Matt Glass and welcome to my course Vulnerability Management. The Big picture Recent cyberattacks have highlighted the need for an information security strategy that addresses vulnerabilities and information systems and reduces the risk of becoming the next target for malicious threats. In this course, you'll learn how to detect, analyze and remediate or mitigate information system vulnerabilities. Using a vulnerability scanner, this course will cover a vulnerability management process that covers each step that you acting as an information system security officer can follow to secure your organization systems. The process will cover vulnerability, discovery, vulnerability, analysis, prioritization and reporting of vulnerabilities and remediation and mitigation of those vulnerabilities. Throughout the course, I've prepared some demos so that you can conduct the process on a virtual machine or your home computer using the Nexus scanner as a big picture course, the emphasis is on learning the basics of a vulnerability management process and the importance of its implementation. There are no prerequisites for this course, and it's perfect for anyone who wants an introduction to vulnerability management of information systems. I really enjoy creating this course, and I hope you enjoy learning from it. Thanks for watching