Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Implementing a Vulnerability Management Lifecycle

Description

Get a step-by-step process for finding, prioritizing, and mitigating the vulnerabilities in your computing environment, no matter what technology stack you're running.

Tags

Syllabus

Introduction
  • Everyone needs a vulnerability management program
  • What you should know
1. Prepare for Vulnerability Management
  • Defining vulnerability management
  • The benefits of vulnerability management
2. Create the Vulnerability Management Program
  • Succeed by setting program goals
  • Make a great business case
  • Assign qualified people
  • Step 1 case study
3. Conduct Weekly Vulnerability Scans
  • Creating the right core process
  • How to discover known vulnerabilities
  • Generating actionable vulnerability reports
  • Validate reported vulnerabilities
  • Step 2 case study
4. Mitigate Found Vulnerabilities
  • How to design effective mitigations
  • How to fix vulnerabilities
  • How to verify mitigation success
  • Step 3 case study
Conclusion
  • Next steps

Online Course


Implementing a Vulnerability Management Lifecycle

Affiliate notice

Get a step-by-step process for finding, prioritizing, and mitigating the vulnerabilities in your computing environment, no matter what technology stack you're running.

Introduction
  • Everyone needs a vulnerability management program
  • What you should know
1. Prepare for Vulnerability Management
  • Defining vulnerability management
  • The benefits of vulnerability management
2. Create the Vulnerability Management Program
  • Succeed by setting program goals
  • Make a great business case
  • Assign qualified people
  • Step 1 case study
3. Conduct Weekly Vulnerability Scans
  • Creating the right core process
  • How to discover known vulnerabilities
  • Generating actionable vulnerability reports
  • Validate reported vulnerabilities
  • Step 2 case study
4. Mitigate Found Vulnerabilities
  • How to design effective mitigations
  • How to fix vulnerabilities
  • How to verify mitigation success
  • Step 3 case study
Conclusion
  • Next steps