Vulnerability Management: The Big Picture

Information systems vulnerabilities expose networks to attack by threats, and potential loss to your organization. This course will teach you about a vulnerability management process that can help you identify, analyze, and patch vulnerabilities.
Course info
Rating
(12)
Level
Beginner
Updated
Sep 27, 2017
Duration
1h 38m
Table of contents
Description
Course info
Rating
(12)
Level
Beginner
Updated
Sep 27, 2017
Duration
1h 38m
Description

Keeping an information system secure is an essential and continual process to stop potential threats. In this course, Vulnerability Management: The Big Picture, you'll learn the vulnerability management process and how it fits into an information security plan. First, you'll discover the importance of conducting regular vulnerability scans. Next, you'll explore how to prioritize vulnerability remediation. Finally, you'll delve into some tools that are available to help you automate these processes. By the end of this course, you'll have developed a deeper understanding of the basics of the vulnerability management process and the importance of its implementation.

About the author
About the author

Matt Glass is a Multi-national Systems Integrator in Stuttgart, Germany, working as a government contractor. He has been working in the IT field for the last eight years.

More from the author
Getting Started with Nmap
Beginner
1h 26m
Oct 5, 2018
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
(Music playing) Hello everyone. I'm Matt Glass, and welcome to my course, Vulnerability Management: The Big Picture. Recent cyber attacks have highlighted the need for an information security strategy that addresses vulnerabilities in information systems and reduces the risk of becoming the next target for malicious threats. In this course, you'll learn how to detect, analyze, and remediate, or mitigate information system vulnerabilities using a vulnerability scanner. This course will cover a vulnerability management process that covers each step that you, acting as an information systems security officer, can follow to secure your organization systems. The process will cover vulnerability discovery, vulnerability analysis, prioritization and reporting of vulnerabilities, and remediation and mitigation of those vulnerabilities. Throughout the course, I've prepared some demos so that you can conduct the process on a virtual machine or your home computer using the Nessus scanner. As a big picture course, the emphasis is on learning the basics of a vulnerability management process and the importance of its implementation. There are no prerequisites for this course, and it's perfect for anyone who wants an introduction to vulnerability management with information systems. I really enjoyed creating this course, and I hope you enjoy learning from it. Thanks for watching.