Fundamental Vulnerability Management

Cybrary
MicroCourse

Vulnerability Management is a continuous information security risk process that requires management oversight and includes a 4-tier approach of: discovery, reporting, prioritization, and response

Time
1 hour 51 minutes
Difficulty
Beginner
CEU/CPE
3
Share
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

MicroCourse Content
MicroCourse Description

What is Vulnerability Management? Vulnerability Management is a continuous information security risk process that requires management oversight and includes a 4-tier approach of: discovery, reporting, prioritization, and response. Why do I need this Certification? Many companies, organizations, and even medical facilities are required to meet a certain compliance with regards to vulnerability management. And while the effort and complexity of vulnerability management can be overwhelming to those entities, it is an easy task for professionals versed in the high-level process. What will I learn? How to use popular scanning tools How to deliver progress reports How to implement increased system coverage Get your Certification in Fundamental Vulnerability Management Today: Many companies, organizations, and even medical facilities are required to meet a certain compliance with regards to vulnerability management. And while the effort and complexity of vulnerability management can be overwhelming to those entities, it is an easy task for professionals versed in the high-level process. Vulnerability Management is a continuous information security risk process that requires management oversight and includes a 4-tier approach of: discovery, reporting, prioritization, and response. The objective for Vulnerability Management Analysts is to determine internal and external weaknesses, report and resolve them. This Micro Certification covers usage of popular scanning tools, delivery of progress reports, and implementation of increased system coverage. Although somewhat similar to penetration testing, the difference lies in the fact that vulnerability assessment lacks exploitation. But one thing is certain, it is a necessity. In a post from Tenable Network Security, they discuss how a particular industry is at the forefront of vulnerability management and further driving it?s? need.

Instructed By
John Oyeleke
John Oyeleke
Lead IT Security Instructor
Instructor
Provider
Cybrary
Course Components
On Demand Videos to learn from industry leaders
Assessments to gauge understanding and comprehension
Certificate of Completion
Certificate Of Completion

Complete this entire course to earn a Fundamental Vulnerability Management Certificate of Completion