Study any time, from any device.

Vulnerability Management Process

Brush up on your knowledge of vulnerability management with fifteen videos on policy requirements, scanning and more.

15 videos  //  56 minutes of training

Course description

Every system has a weak spot, and it’s part of your job to know how to recognize and reinforce those weak spots. In this course, fifteen videos help you take your knowledge of vulnerability management up a notch. Beginning with the basics of regulatory and corporate policy requirements, you’ll cover scanning tools and scanning sensitivity, authenticated scanning, maintaining scanners, standardizing vulnerabilities, vulnerability reporting, remediation priorities and more.

Course syllabus

Intro to Vulnerability ManagementDuration: 2:31

Regulatory RequirementsDuration: 7:04

Corporate Policy RequirementsDuration: 6:59

Scanning ToolsDuration: 3:31

Scoping ScansDuration: 3:27

Configuring ScansDuration: 0:32

Scanning SensitivityDuration: 3:15

Scanning PerspectiveDuration: 1:21

Authenticated ScanningDuration: 3:39

Maintaining ScannersDuration: 3:19

Standardizing VulnerabilitiesDuration: 3:19

Workflow for RemediationDuration: 2:45

Vulnerability ReportingDuration: 4:13

Remediation PriorityDuration: 4:12

Implementing and TestingDuration: 5:29

Meet the author

Jason Dion

LinkedIn

Jason Dion specializes in actionable information you can use to further your Cyber Security and Information Technology career. He provides IT certification and training videos to help students prepare for a career in the Information Technology and Cyber Security field, providing you with the real world training and application to today's cyber security challenges.

Jason Dion, CISSP No. 349867, is an Instructor at Liberty University’s College of Engineering and Computational Science and Anne Arundel Community College’s Department of Computing Technologies with multiple information technology professional certifications, including Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Network Defense Architect (CNDA), Digital Forensic Examiner (DFE), Digital Media Collector (DMC), Security+, Network+, A+, PRINCE2, PRINCE2 Agile, and ITIL.

You're in good company

"Comparing Infosec to other vendors is like comparing apples to oranges. My instructor was hands-down the best I’ve had." 

James Coyle

FireEye, Inc.

"I knew Infosec could tell me what to expect on the exam and what topics to focus on most."

Julian Tang

Chief Information Officer

"I’ve taken five boot camps with Infosec and all my instructors have been great."

Jeffrey Coa

Information Security Systems Officer