Executive Vulnerability Management

This course covers vulnerability management from an Executive Leadership level, and to help Executive Leadership understand the challenges of implementing a vulnerability management program, including implications if it is not set up properly.
2
35
M
Time
advanced
difficulty
3
ceu/cpe

Course Content

Patching Cycles

8m

Common Problems in VulnMgmt
Introduction

3m

Vulnerability Management
Aligning Teams

6m

Solving VulnMgmt Issues
Software/Hardware Requirements

11m

Common Problems in VulnMgmt
What is Vulnerability Management?

13m

Vulnerability Management
Consolidating Products

7m

Solving VulnMgmt Issues
Private Sector Requirements

8m

Common Problems in VulnMgmt
Building a VulnMgmt Program

10m

Vulnerability Management
Risk Analysis/Profile

7m

Solving VulnMgmt Issues
Public Sector Regulations

4m

Common Problems in VulnMgmt
Security Teams/Responsibilities

10m

Vulnerability Management
Automating Tasks

7m

Solving VulnMgmt Issues
Vulnerability Scoring Methodologies

7m

Common Problems in VulnMgmt
Executive Leadership Role

10m

Vulnerability Management
Improving Overall Security

7m

Solving VulnMgmt Issues
Remediation/Prioritization

8m

Common Problems in VulnMgmt
Course Description

Vulnerability management is how security vulnerabilities are identified, evaluated, and treated in an organization. Understanding vulnerabilities is instrumental in any organization, large or small. This course will detail the creation of a vulnerability management program, to include responsibilities and resources available to improve efficiency and decrease risk throughout an enterprise. Individuals who enroll in this course will learn who should be involved in the vulnerability management process, what tasks are associated to create a secure environment, and what technology can aid in this process. Another important concept for this course is how vulnerability management is integral to any information security program, and how it can compliment other functions within the program.

This course will also address case studies and issues which can arise when vulnerability management programs are not as mature. After discussing these case studies, some tips will be provided to help mature a vulnerability management program, and what Executive leadership can do in an organization to support and grow their own programs. This course is intended to first educate Executive leadership, but also provide real-world scenarios and ways to improve security throughout the organization. All who enroll should finish the course with actionable items to take back to their businesses to support their Security teams, or even implement new practices and technologies which could improve overall security.

This course is part of a Career Path:
No items found.

Instructed by

Instructor
Nikki Robinson

Dr. Nikki Robinson is a Cybersecurity Engineer, with over 12 years of experience in both IT and Security positions. Her main focus in Cyber is in vulnerability management and assessments, incident response, and investigations / forensics. She has received her Doctorate of Science in Cybersecurity from Capitol Technology University, and holds several certifications in the IT and Security fields (including CEH/CNDA, MCITP, and CCAA). She is also working on several research projects, publications, and teaching opportunities. She is currently serving as a Board member for the FBI Infragard Maryland Chapter and is actively involved in several industry organizations

Provider
Cybrary Logo
Certification Body
Certificate of Completion

Complete this entire course to earn a Executive Vulnerability Management Certificate of Completion

Course
This is some text inside of a div block.

Executive Vulnerability Management

Course

This course covers vulnerability management from an Executive Leadership level, and to help Executive Leadership understand the challenges of implementing a vulnerability management program, including implications if it is not set up properly.
Path Releasing Q2 2025
Full access included with 
Insider Pro
 and 
Teams

2

H

35

M
Time

advanced

i
This is some text inside of a div block.
Experience Level

3

i

This is some text inside of a div block.
CEU's

1

Enrollees

Heading

H

Heading

M
Time

Heading

i
This is some text inside of a div block.
Experience Level

Heading

i

This is some text inside of a div block.
CEU's

Heading

Enrollees

Learners at 96% of Fortune 1000 companies trust Cybrary

About this course

This course covers vulnerability management from an Executive Leadership level, and to help Executive Leadership understand the challenges of implementing a vulnerability management program, including implications if it is not set up properly.
Read More

Course Description

Vulnerability management is how security vulnerabilities are identified, evaluated, and treated in an organization. Understanding vulnerabilities is instrumental in any organization, large or small. This course will detail the creation of a vulnerability management program, to include responsibilities and resources available to improve efficiency and decrease risk throughout an enterprise. Individuals who enroll in this course will learn who should be involved in the vulnerability management process, what tasks are associated to create a secure environment, and what technology can aid in this process. Another important concept for this course is how vulnerability management is integral to any information security program, and how it can compliment other functions within the program.

This course will also address case studies and issues which can arise when vulnerability management programs are not as mature. After discussing these case studies, some tips will be provided to help mature a vulnerability management program, and what Executive leadership can do in an organization to support and grow their own programs. This course is intended to first educate Executive leadership, but also provide real-world scenarios and ways to improve security throughout the organization. All who enroll should finish the course with actionable items to take back to their businesses to support their Security teams, or even implement new practices and technologies which could improve overall security.

Train Your Team

Cybrary’s expert-led cybersecurity courses help your team remediate skill gaps and get up-to-date on certifications. Utilize Cybrary to stay ahead of emerging threats and provide team members with clarity on how to learn, grow, and advance their careers within your organization.

Included in a Path

Nikki Robinson
Cyber Engineer
Read Full Bio
Learn

Learn core concepts and get hands-on with key skills.

Practice

Exercise your problem-solving and creative thinking skills with security-centric puzzles

Prove

Assess your knowledge and skills to identify areas for improvement and measure your growth

Get Hands-on Learning

Put your skills to the test in virtual labs, challenges, and simulated environments.

Measure Your Progress

Track your skills development from lesson to lesson using the Cybrary Skills Tracker.

Connect with the Community

Connect with peers and mentors through our supportive community of cybersecurity professionals.

Success from Our Learners

"Cybrary really helped me get up to speed and acquire a baseline level of technical knowledge. It offers a far more comprehensive approach than just learning from a book. It actually shows you how to apply cybersecurity processes in a hands-on way"

Don Gates

Principal Systems Engineer/SAIC

"Cybrary’s SOC Analyst career path was the difference maker, and was instrumental in me landing my new job. I was able to show the employer that I had the right knowledge and the hands-on skills to execute the role."

Cory

Cybersecurity analyst/

"I was able to earn my CISSP certification within 60 days of signing up for Cybrary Insider Pro and got hired as a Security Analyst conducting security assessments and penetration testing within 120 days. This certainly wouldn’t have been possible without the support of the Cybrary mentor community."

Mike

Security Engineer and Pentester/

"Cybrary really helped me get up to speed and acquire a baseline level of technical knowledge. It offers a far more comprehensive approach than just learning from a book. It actually shows you how to apply cybersecurity processes in a hands-on way"

Don Gates

Principal Systems Engineer/SAIC

"Cybrary’s SOC Analyst career path was the difference maker, and was instrumental in me landing my new job. I was able to show the employer that I had the right knowledge and the hands-on skills to execute the role."

Cory

Cybersecurity analyst/

"I was able to earn my CISSP certification within 60 days of signing up for Cybrary Insider Pro and got hired as a Security Analyst conducting security assessments and penetration testing within 120 days. This certainly wouldn’t have been possible without the support of the Cybrary mentor community."

Mike

Security Engineer and Pentester/

"Becoming a Cybrary Insider Pro was a total game changer. Cybrary was instrumental in helping me break into cybersecurity, despite having no prior IT experience or security-related degree. Their career paths gave me clear direction, the instructors had real-world experience, and the virtual labs let me gain hands-on skills I could confidently put on my resume and speak to in interviews."

Cassandra

Information Security Analyst/Cisco Systems

"I was able to earn both my Security+ and CySA+ in two months. I give all the credit to Cybrary. I’m also proud to announce I recently accepted a job as a Cyber Systems Engineer at BDO... I always try to debunk the idea that you can't get a job without experience or a degree."

Casey

Cyber Systems Engineer/BDO

"Cybrary has helped me improve my hands-on skills and pass my toughest certification exams, enabling me to achieve 13 advanced certifications and successfully launch my own business. I love the practice tests for certification exams, especially, and appreciate the wide-ranging training options that let me find the best fit for my goals"

Angel

Founder,/ IntellChromatics.