Implementing and Performing Vulnerability Management

Today cyber-crime is forcing organizations to pay more attention to information security. You'll learn that Vulnerability Management Programs helps detect and mitigate issues in your environment and help stop attackers from accessing your resources.
Course info
Rating
(13)
Level
Beginner
Updated
Dec 19, 2018
Duration
3h 20m
Table of contents
Course Overview
What Do You Need to Start?
Shaping and Implementing Your Vulnerability Scans
The Scanners
Analyzing Vulnerability Scans
Remediation and Change Control
Remediating Host Vulnerabilities
Remediating Network Vulnerabilities
Remediating Virtual Environments Vulnerabilities
Description
Course info
Rating
(13)
Level
Beginner
Updated
Dec 19, 2018
Duration
3h 20m
Description

Networks aren't what they us to be, they're more complex than ever. Systems today are so interconnected and buried within those systems are thousands of undetected security vulnerabilities waiting to be used against you. Vulnerability Management systems are designed to recognize, rank, and remediate these vulnerabilities before an attacker gets a hold of them and exploits them to destabilize the privacy, integrity, or availability of your digital assets. In this course, Implementing and Performing Vulnerability Management, you'll learn about everything around vulnerability management. First, you'll learn about implementing a supportive vulnerability management VM program. Next, you'll explore through scanning. Finally, you'll dive into remediation steps that will help make sure attackers can't take advantage of you. By the end of this course, you’ll have enough knowledge to not only pick the VMP that’s right for you, but also how to use such applications to better the security of your network. Plus, you'll have all the information about VMP’s to help you with your CSA+ exam.

About the author
About the author

Dale Meredith received his Certified Ethical Hacker and Certified EC-Counsel Instructor certifications back in 2006, as well as being a Microsoft Certified Trainer since 1998 (yes we had computers back then). Dale takes great pride in helping students comprehend and simplify complex IT concepts.

More from the author
More courses by Dale Meredith
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi everyone, my name is Dale Meredith, and I'd like to welcome you to my course, Implementing and Performing Vulnerability Management. Now this course can be watched either a la carte, or as part of the CSA path. Now I've personally been a Microsoft trainer since 1998, as well as a cyber security trainer and consultant, and I've worked for several corporate 500 companies, as well as the Department of Homeland Security on several projects. And I'd love to tell you about those, but then, of course, I'd have to kill you. Now every time a computer, or a device for that matter, connects to the internet, there's a risk of an attacker taking advantage of some new vulnerability. This needle in a cyber haystack can actually reek all kinds of chaos on your network, but most disturbing is the fact that these vulnerabilities come from devices that you might not have even considered as a source of an attack vector. Attackers use these vulnerabilities to worm their ways into your network, and steal things like your intellectual property, create denial of service attacks, use your system for their own gain, or even steal one of your most valuable resources, your customers' data. Well, I want to help you make sure that you cover all your bases by talking with you about implementation and guidelines around running a VMP, or a vulnerability management program. Now some of the topics we'll talk about include, obviously, how to choose a VMP, as well as how to tweak the VMP to give you better intel. And based on the reports that the VMP gives you, how to remediate the changes that are necessary. By the end of this course, you'll have enough knowledge to not only pick out the VMP that's right for you, but also how to use such applications to better the security of your network. You know what, I'm also going to make sure that you have all the information about VMPs to help you with your CSA exam. Before beginning this course, you should be familiar with the basic networking technologies like TCP/IP and devices like routers and switches. If you want to run the labs, you'll need to have also watched a couple of other courses within the series that are before this one, including the Issues of Identity and Access Management, and Secure Software Development. So that being said, I hope you'll join me on this adventure in learning with Implementing and Performing Vulnerability Management course, here at Pluralsight.