Implementing a Vulnerability Management Lifecycle

Go to class
Write Review

Free Online Course: Implementing a Vulnerability Management Lifecycle provided by LinkedIn Learning is a comprehensive online course, which lasts for Less than 1 hour of material. The course is taught in English and is free of charge. Upon completion of the course, you can receive an e-certificate from LinkedIn Learning. Implementing a Vulnerability Management Lifecycle is taught by Kip Boyle.

Overview
  • Get a step-by-step process for finding, prioritizing, and mitigating the vulnerabilities in your computing environment, no matter what technology stack you're running.

Syllabus
  • Introduction

    • Everyone needs a vulnerability management program
    • What you should know
    1. Prepare for Vulnerability Management
    • Defining vulnerability management
    • The benefits of vulnerability management
    2. Create the Vulnerability Management Program
    • Succeed by setting program goals
    • Make a great business case
    • Assign qualified people
    • Step 1 case study
    3. Conduct Weekly Vulnerability Scans
    • Creating the right core process
    • How to discover known vulnerabilities
    • Generating actionable vulnerability reports
    • Validate reported vulnerabilities
    • Step 2 case study
    4. Mitigate Found Vulnerabilities
    • How to design effective mitigations
    • How to fix vulnerabilities
    • How to verify mitigation success
    • Step 3 case study
    Conclusion
    • Next steps