Vulnerability management Course

1 hour, 54 minutes

Syllabus

Fundamentals of threat intelligence

Video - 00:13:00

Threat intelligence helps you identify the likely threats to your environment so you can prepare the best defense.
Asset discovery

Video - 00:23:00

Network components can be all over the place, both physically and logically. You have to understand how your network nodes are physically connected and logically organized to secure them from attack.
Industry frameworks

Video - 00:24:00

Learn about the various best practices frameworks available for security implementation.
Scanning tools

Video - 00:04:00

Learn about setting up vulnerability scanning criteria, reviewing resources, and scoping.
Validation

Video - 00:04:00

You can’t trust all results. Not every alarm is a cause for concern. You must validate all results before making any decisions.
Prioritization

Video - 00:05:00

Some exploits are more harmful then others. When it comes to prioritization of exploits, we need to have a grasp of how quickly and how much cost we should dedicate to fixing that vulnerability. This episode will cover the prioritization of exploits and when to address them.
Attack mitigation, part 1

Video - 00:14:00

In this episode, we will learn about data poisoning, broken access controls, and mitigations of attacks on our systems.
Attack mitigation, part 2

Video - 00:16:00

We continue our discussion of mitigation with the security risks of end-of-life components, identification and authentication failures, and other various attack mitigation strategies for our systems.
Controls

Video - 00:06:00

We can't always fix every flaw in our system, that's simply the nature of softwares and servers. Learn the best methods to standardize our handling and responses to these control systems we can't always protect.
Secure software development

Video - 00:06:00

Understand when and where security should be injected into the software development life cycle.

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Learn about scholarships and financing with

Affirm logo

Award-winning training you can trust