This course provides participants with the foundational knowledge and practical skills required to design, implement, and operate a mature, continuous vulnerability management (VM) program. Participants will move beyond basic vulnerability scanning to understand risk-based prioritization, effective cross-team remediation, automation techniques (Vulnerability Management Tools), and advanced metrics for reporting security posture to executive leadership.
Prerequisites
To get the most of this session, participants should have:
- Understanding of TCP/IP networking, operating systems, and common network services
- Basic knowledge of common cyber threats and security controls
- Familiarity with cloud computing concepts
- A basic understanding of patch management workflows
- Familiarity with ticketing systems (JIRA, ServiceNow)
Â
Purpose
| Gain skills and knowledge to design, implement, and operate a vulnerability management program |
Audience
| IT and Security Professionals desiring more advanced skills in the use of a vulnerability management program. |
Role
| Security Engineers |Â Security Analysts |Â IT Managers |Â System Administrators |Â DevOps Engineers |Â Compliance Officers
|
Skill level
| Intermediate |
Style
| Lecture | Hands-on Activities |
Duration
| 4 days |
Related technologies
| Networking | Cloud | Python | PowerShell |
Â
Learning objectives
- Establish the continuous VM lifecycle
- Design a comprehensive asset inventory program
- Prioritize vulnerabilities using contextual risk factors
- Develop effective cross-functional remediation strategies
- Define and communicate risk metrics[JC3.1]
- Ability to differentiate between vulnerability, exposure, and misconfiguration