
The subject
What will you learn?
Syllabus
-
-
See how your vulnerability assessment skills stack up against other professionals in your field.
-
-
-
-
This course covers the basics of vulnerability assessment, including definitions, scope, policy and process.
-
-
-
Introduction to what vulnerability assessment is, its purpose and why is it valuable.
-
-
-
Examines in detail the different steps of the assessment process.
-
-
-
Answers the question: "What are we assessing?" and defines different approaches for the specific assessment.
-
-
-
Gives you pointers on how to go about creating a vulnerability assessment policy.
-
-
-
This course guides you through five different type of security tools for discovering vulnerabilities in various environments.
-
-
-
Define what SAST is and compare different solutions. Demo with Coverity.
-
-
-
From drivers to libraries and plugins, open-source is everywhere and it presents risks for your system. Includes a demonstration with OSS Index and VSCode Plugin.
-
-
-
Define what dynamic analysis and dynamic network analysis are and compare different solutions. Demo with Nessus.
-
-
-
What is dynamic application security testing? A look at top DAST solutions. Demo with the Arachni security framework.
-
-
-
What is IAST? A look at examples of IAST solutions. Demo with Contrast.
-
-
-
This course covers three main topics: false positives, standardized vulnerabilities, and weakness classification systems and threat-based vulnerability/weakness classification.
-
-
-
How to strategically handle false positives in order to narrow down the list of vulnerabilities for further analysis.
-
-
-
Addressing common vulnerabilities and exposures (CVE) and common weaknesses enumeration (CWE) and how to use them.
-
-
-
We will focus on how to organize all the discovered vulnerabilities based on the threat they present.
-
-
-
This course covers how to classify and prioritize vulnerabilities based on real-world criticality measures and how to define the true risk of the vulnerabilities for a specific environment.
-
-
-
What do you do if you have a huge list of vulnerabilities and only limited time and resources? You prioritize! We will examine the most important factors defining vulnerability priority.
-
-
-
We will look at what you need to know about your system to carry out a thorough assessment.
-
-
-
Helping you identify potential attack targets in your environment.
-
-
-
Constructing a risk matrix to help us quantify the risks to our organization introduced by security vulnerabilities.
-
-
-
What is a security risk assessment and how do we conduct it?
-
-
-
This course covers how to create comprehensive, clear and easy-to-understand vulnerability assessment documentation, and how to go about keeping the vulnerability findings and scoring current.
-
-
-
A look at how do we capture everything we've done so far in comprehensive report.
-
-
-
How to update the risk score of vulnerabilities when risk factors are changing.
-
-
-
How do we maintain the list of current vulnerabilities? How to integrate vulnerability scanning in the pipeline.
-
-
-
In this course, we will cover a wide range of topics about the vulnerability remediation and mitigation process, including the most common remediations and mitigations and strategies for deployment of security measures.
-
-
-
What are the most common remediation and mitigation types? How easily can the different types be deployed?
-
-
-
Important points to consider while identifying and researching security measures.
-
-
-
Defining an approach for bringing the risk to an acceptable level and applying the identified remediations and mitigations.
-
-
-
Handling the inventory, testing and deployment of security patches, the most common security mitigation type.
-
-
-
How to keep track of configuration changes across multiple devices. From system hardening deployment to controlling and monitoring for future misconfigurations.
-
-
-
This course covers the top most effective security controls to reduce the overall risk of systems and networks. Recommendation of such controls is a perfect add-on for any vulnerability assessment.
-
-
-
Learn what NAC is and discover its main functions and features, how to deploy it and some integration options.
-
-
-
You will learn about the different types of firewall and their use cases, pros and cons.
-
-
-
Learn about the comprehensive, integrated enterprise security monitoring, using Security Onion as a case study.
-
-
-
Learn about one of the most powerful endpoint protection mechanisms against malware. We will go though an overview of the technology and will outline a couple of solutions.
-
-
-
Learn about various advanced authentication mechanisms that you can apply in your organization. From standard multi-factor authentication to using biometrics, behavioral and risk-based analytics for more secure authentication.
-
-
-
Learn about protecting your application from the inside out! What is RASP, how does it work and what are some RASP solutions?
-
-
-
Explore different data protection mechanisms for protecting the data at rest and in transit.
-
The details