Managing and remediating vulnerabilities is one of the most important tasks in cybersecurity. In this course, we will explore how to use the Qualys Cloud Platform to implement a full vulnerability management program.
Vulnerable applications and insecure configurations are some of the top attack vectors for hackers, and it only takes one vulnerability to have a whole company compromised.
In this course, Vulnerability Management with Qualys Cloud Platform, you will learn how to use the Qualys Cloud Platform to identify and manage the vulnerabilities in your company.
First, you will explore the Qualys architecture and how to deploy the Qualys scanners in your environment.
Then, you will discover how to scope and plan your vulnerability management program.
Finally, you will learn how to configure scans and reports in Qualys, create proper vulnerability remediation plans, and investigate zero-day vulnerabilities with Qualys.
When you are finished with this course, you will have the knowledge of how to deploy a full vulnerability management program, from configuring scanners to generating executive reports.
Software required: Qualys Cloud Enterprise Edition or Qualys Cloud Community Edition (Free version)
Ricardo is a Cybersecurity Consultant based in Toronto (Canada). He has 10+ years of IT experience, 6 of them in the IT Security field. His main interests are: SIEM solutions (IBM QRadar), Enterprise Security Risk, Penetration Testing, Security processes/procedures and Network Security.
Course Overview Hi everyone. My name is Ricardo. and welcome to my course, Vulnerability Management with Qualys Cloud Platform. I'm a cyber‑security specialist with years of experience in vulnerability management, and I will show you the step‑by‑step of deploying full vulnerability management program using the Qualys tool. The interesting part of this course is that we cover not only the technical parts of Qualys, but also the process and strategies to implement a good vulnerability management program. For example, you not only learn how to properly configure a scan in Qualys, but also you'll learn how to identify which servers should be scanned and how to create a proper vulnerability remediation plan. By the end of this course, you'll be able to: understand the vulnerability management process and the Qualys architecture, deploy and configure Qualys in your company, define the scan scope and requirements for your project, configure the scans in Qualys, create a remediation plan for your vulnerabilities, generate reports for both technical and management team, and even investigate 0‑day vulnerabilities with Qualys. Throughout this course, we'll implement a full vulnerability management program for Globomantics, which is a medium‑sized financial institution. You will see tons of interesting demos showing how to do everything in Qualys from configuring scans to generating reports. And the best part is, you can follow this course and reproduce all these demos at home by using the Qualys Community Edition, which is a free version of Qualys so then you can have hands‑on experience on it, too. So I hope you'll join me on this journey to learn about vulnerability management with the Qualys Cloud Platform, here at Pluralsight.