1.0 Introduction - VM

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
1 hour 23 minutes
Difficulty
Beginner
CEU/CPE
2
Video Transcription
00:00
Welcome to the I T. Security Gumbel Vulnerability management fundamentals. I'm your host, Cory Charles.
00:07
Now, in this course, we're gonna focus on vulnerability in management
00:11
from a foundation of standpoint.
00:15
Now, before we move forward in the course over, like the first and foremost introduce myself and give you guys some accolades about myself
00:23
again. My name is Cory Charles.
00:26
I have over 12 his experience and 90 security specialization in vulnerability management.
00:31
I've altered
00:32
multiple vulnerability management books.
00:36
I have a massive degree in computer forensics management.
00:39
I also have a mass degree in computer security management.
00:42
I have a host of undergraduate degrees
00:45
alone. Is that what executive certificate is? Well, too?
00:49
I'm certified in security. Plus,
00:52
I'm also certified as a quality vulnerability. Imagine it, specialist.
00:56
And I'm also certified Oracle Premium very P six.
01:02
Now let's take a look at the course objectives.
01:06
So first we're gonna define with his vulnerability management.
01:10
I want to give you guys a
01:11
deep understanding of what is vulnerability management and where was born ability Imagine derived from
01:21
Secondly,
01:22
we're gonna understand that risk of networking and buddy software,
01:26
So we're actually gonna understand why software fights against each other at times
01:30
and why it doesn't play fair with the network at times. Basically, why does it drop? Or basically, it's not responsible
01:41
Thoroughly. We're gonna understand the Art Institute of Domains
01:45
and Related Concepts.
01:47
So we're gonna look at so security engineering.
01:49
We're also gonna look at Bush Engineering,
01:53
and we're gonna look at encryption as well to as these air key components of on ability management.
02:02
Lastly, we're gonna understand how to use the viability. Imagine applications to improve your network security.
02:09
So we have two such as qualities
02:13
and also necessary well, to which those two tools are very, very popular. So we're going to speak a lot
02:20
about the qualities, too, in this particular section.
02:28
Now let's take a look at the main goal.
02:32
So the main goal is to prepare you guys toe learn network vulnerability management as it's very important, imperative
02:43
to day to day business operations
02:45
and most importantly to the financial
02:47
help of the business.
02:52
Now, for the secondary goal,
02:57
we're gonna focus on selecting the correct vulnerability management tools
03:00
now, without selecting the correct vulnerability. Imagine tools.
03:05
You can actually miss vulnerabilities
03:07
or basically have the incorrect plug ins
03:10
or you can have an instance where actual tool
03:15
where calls Maur home
03:17
inside of the environment as opposed to helping the environment.
03:23
Now we're gonna go ahead and move on to Marja one now.
Up Next
Fundamentals of Vulnerability Management

Most of the successful attacks through a business network could be prevented with vulnerability management. This course focuses on what you can do to automatically manage vulnerabilities and keep your network safe from attack.

Instructed By