Vulnerability Management: The Big Picture

Information systems vulnerabilities expose networks to attack by threats, and potential loss to your organization. This course will teach you about a vulnerability management process that can help you identify, analyze, and patch vulnerabilities.
Course info
Rating
(29)
Level
Beginner
Updated
Sep 27, 2017
Duration
1h 37m
Table of contents
Description
Course info
Rating
(29)
Level
Beginner
Updated
Sep 27, 2017
Duration
1h 37m
Your 10-day individual free trial includes:

Expert-led courses

Keep up with the pace of change with thousands of expert-led, in-depth courses.
Description

Keeping an information system secure is an essential and continual process to stop potential threats. In this course, Vulnerability Management: The Big Picture, you'll learn the vulnerability management process and how it fits into an information security plan. First, you'll discover the importance of conducting regular vulnerability scans. Next, you'll explore how to prioritize vulnerability remediation. Finally, you'll delve into some tools that are available to help you automate these processes. By the end of this course, you'll have developed a deeper understanding of the basics of the vulnerability management process and the importance of its implementation.

About the author
About the author

Matt Glass is an IT Project Manager in Stuttgart, Germany, working as a government contractor. He has more than 12 years of IT experience in a variety of roles.

More from the author
Execution with Donut
Intermediate
19m
Nov 15, 2021
Impact with Low Orbit Ion Cannon (LOIC)
Intermediate
23m
Sep 30, 2021
Manage Suricata Rule Sets and Rule Sources
Intermediate
1h 6m
Apr 27, 2021
More courses by Matt Glass
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
[Autogenerated] Hello, everyone. I'm Matt Glass and welcome to my course Vulnerability Management. The Big picture Recent cyberattacks have highlighted the need for an information security strategy that addresses vulnerabilities and information systems and reduces the risk of becoming the next target for malicious threats. In this course, you'll learn how to detect, analyze and remediate or mitigate information system vulnerabilities. Using a vulnerability scanner, this course will cover a vulnerability management process that covers each step that you acting as an information system security officer can follow to secure your organization systems. The process will cover vulnerability, discovery, vulnerability, analysis, prioritization and reporting of vulnerabilities and remediation and mitigation of those vulnerabilities. Throughout the course, I've prepared some demos so that you can conduct the process on a virtual machine or your home computer using the Nexus scanner as a big picture course, the emphasis is on learning the basics of a vulnerability management process and the importance of its implementation. There are no prerequisites for this course, and it's perfect for anyone who wants an introduction to vulnerability management of information systems. I really enjoy creating this course, and I hope you enjoy learning from it. Thanks for watching