Information systems vulnerabilities expose networks to attack by threats, and potential loss to your organization. This course will teach you about a vulnerability management process that can help you identify, analyze, and patch vulnerabilities.
Keeping an information system secure is an essential and continual process to stop potential threats. In this course, Vulnerability Management: The Big Picture, you'll learn the vulnerability management process and how it fits into an information security plan. First, you'll discover the importance of conducting regular vulnerability scans. Next, you'll explore how to prioritize vulnerability remediation. Finally, you'll delve into some tools that are available to help you automate these processes. By the end of this course, you'll have developed a deeper understanding of the basics of the vulnerability management process and the importance of its implementation.
Course Overview (Music playing) Hello everyone. I'm Matt Glass, and welcome to my course, Vulnerability Management: The Big Picture. Recent cyber attacks have highlighted the need for an information security strategy that addresses vulnerabilities in information systems and reduces the risk of becoming the next target for malicious threats. In this course, you'll learn how to detect, analyze, and remediate, or mitigate information system vulnerabilities using a vulnerability scanner. This course will cover a vulnerability management process that covers each step that you, acting as an information systems security officer, can follow to secure your organization systems. The process will cover vulnerability discovery, vulnerability analysis, prioritization and reporting of vulnerabilities, and remediation and mitigation of those vulnerabilities. Throughout the course, I've prepared some demos so that you can conduct the process on a virtual machine or your home computer using the Nessus scanner. As a big picture course, the emphasis is on learning the basics of a vulnerability management process and the importance of its implementation. There are no prerequisites for this course, and it's perfect for anyone who wants an introduction to vulnerability management with information systems. I really enjoyed creating this course, and I hope you enjoy learning from it. Thanks for watching.