Implementing a Vulnerability Management Program

Implementing a Vulnerability Management Program
Implementing a Vulnerability Management Program
English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 0h 42m | 187 MB

In the past several years, a series of devastating cyberattacks have periodically dominated headlines. While each attack affected different industries and governments, they shared the same root cause: unfixed—but publicly known—vulnerabilities. In this course, get a step-by-step process for finding, prioritizing, and mitigating the vulnerabilities in your own computing environment, no matter what technology stack you’re running. Instructor Kip Boyle shows how to prepare for and create a robust vulnerability management program, explaining how to set program goals and secure funding by creating a compelling business case. Kip also covers how to conduct weekly vulnerability scans, as well as mitigate any vulnerabilities that crop up. Along the way, Kip shares case studies that illustrate how a real-world organization would approach each step in this process.

Table of Contents

Introduction
1 Everyone needs a vulnerability management program
2 What you should know

Prepare for Vulnerability Management
3 Defining vulnerability management
4 The benefits of vulnerability management

Create the Vulnerability Management Program
5 Succeed by setting program goals
6 Make a great business case
7 Assign qualified people
8 Step 1 case study

Conduct Weekly Vulnerability Scans
9 Creating the right core process
10 How to discover known vulnerabilities
11 Generating actionable vulnerability reports
12 Validate reported vulnerabilities
13 Step 2 case study

Mitigate Found Vulnerabilities
14 How to design effective mitigations
15 How to fix vulnerabilities
16 How to verify mitigation success
17 Step 3 case study

Conclusion
18 Next steps