1 hour 23 minutes
Welcome to the I T. Security Gumbel Vulnerability management fundamentals. I'm your host, Cory Charles.
Now, in this course, we're gonna focus on vulnerability in management
from a foundation of standpoint.
Now, before we move forward in the course over, like the first and foremost introduce myself and give you guys some accolades about myself
again. My name is Cory Charles.
I have over 12 his experience and 90 security specialization in vulnerability management.
multiple vulnerability management books.
I have a massive degree in computer forensics management.
I also have a mass degree in computer security management.
I have a host of undergraduate degrees
alone. Is that what executive certificate is? Well, too?
I'm certified in security. Plus,
I'm also certified as a quality vulnerability. Imagine it, specialist.
And I'm also certified Oracle Premium very P six.
Now let's take a look at the course objectives.
So first we're gonna define with his vulnerability management.
I want to give you guys a
deep understanding of what is vulnerability management and where was born ability Imagine derived from
we're gonna understand that risk of networking and buddy software,
So we're actually gonna understand why software fights against each other at times
and why it doesn't play fair with the network at times. Basically, why does it drop? Or basically, it's not responsible
Thoroughly. We're gonna understand the Art Institute of Domains
and Related Concepts.
So we're gonna look at so security engineering.
We're also gonna look at Bush Engineering,
and we're gonna look at encryption as well to as these air key components of on ability management.
Lastly, we're gonna understand how to use the viability. Imagine applications to improve your network security.
So we have two such as qualities
and also necessary well, to which those two tools are very, very popular. So we're going to speak a lot
about the qualities, too, in this particular section.
Now let's take a look at the main goal.
So the main goal is to prepare you guys toe learn network vulnerability management as it's very important, imperative
to day to day business operations
and most importantly to the financial
help of the business.
Now, for the secondary goal,
we're gonna focus on selecting the correct vulnerability management tools
now, without selecting the correct vulnerability. Imagine tools.
You can actually miss vulnerabilities
or basically have the incorrect plug ins
or you can have an instance where actual tool
where calls Maur home
inside of the environment as opposed to helping the environment.
Now we're gonna go ahead and move on to Marja one now.
Fundamentals of Vulnerability Management
Most of the successful attacks through a business network could be prevented with vulnerability management. This course focuses on what you can do to automatically manage vulnerabilities and keep your network safe from attack.