Today cyber-crime is forcing organizations to pay more attention to information security. You'll learn that Vulnerability Management Programs helps detect and mitigate issues in your environment and help stop attackers from accessing your resources.
Networks aren't what they us to be, they're more complex than ever. Systems today are so interconnected and buried within those systems are thousands of undetected security vulnerabilities waiting to be used against you. Vulnerability Management systems are designed to recognize, rank, and remediate these vulnerabilities before an attacker gets a hold of them and exploits them to destabilize the privacy, integrity, or availability of your digital assets. In this course, Implementing and Performing Vulnerability Management, you'll learn about everything around vulnerability management. First, you'll learn about implementing a supportive vulnerability management VM program. Next, you'll explore through scanning. Finally, you'll dive into remediation steps that will help make sure attackers can't take advantage of you. By the end of this course, you’ll have enough knowledge to not only pick the VMP that’s right for you, but also how to use such applications to better the security of your network. Plus, you'll have all the information about VMP’s to help you with your CSA+ exam.
Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale's expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material.
Course Overview Hi everyone, my name is Dale Meredith, and I'd like to welcome you to my course, Implementing and Performing Vulnerability Management. Now this course can be watched either a la carte, or as part of the CSA path. Now I've personally been a Microsoft trainer since 1998, as well as a cyber security trainer and consultant, and I've worked for several corporate 500 companies, as well as the Department of Homeland Security on several projects. And I'd love to tell you about those, but then, of course, I'd have to kill you. Now every time a computer, or a device for that matter, connects to the internet, there's a risk of an attacker taking advantage of some new vulnerability. This needle in a cyber haystack can actually reek all kinds of chaos on your network, but most disturbing is the fact that these vulnerabilities come from devices that you might not have even considered as a source of an attack vector. Attackers use these vulnerabilities to worm their ways into your network, and steal things like your intellectual property, create denial of service attacks, use your system for their own gain, or even steal one of your most valuable resources, your customers' data. Well, I want to help you make sure that you cover all your bases by talking with you about implementation and guidelines around running a VMP, or a vulnerability management program. Now some of the topics we'll talk about include, obviously, how to choose a VMP, as well as how to tweak the VMP to give you better intel. And based on the reports that the VMP gives you, how to remediate the changes that are necessary. By the end of this course, you'll have enough knowledge to not only pick out the VMP that's right for you, but also how to use such applications to better the security of your network. You know what, I'm also going to make sure that you have all the information about VMPs to help you with your CSA exam. Before beginning this course, you should be familiar with the basic networking technologies like TCP/IP and devices like routers and switches. If you want to run the labs, you'll need to have also watched a couple of other courses within the series that are before this one, including the Issues of Identity and Access Management, and Secure Software Development. So that being said, I hope you'll join me on this adventure in learning with Implementing and Performing Vulnerability Management course, here at Pluralsight.