Time
1 hour 23 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:01
in the last video, we talked about performing additional vulnerability scans to verify that patches to systems are working.
00:08
And this video we're going to talk about the best path to eliminate network vulnerabilities
00:15
for learning objectives. We're gonna talk about eliminating network vulnerabilities,
00:21
stipulate a pre assessment
00:24
vulnerability. Management is not an important port of protecting and organizations asset
00:30
is that true or foes?
00:36
This is folks. Vulnerability Management is actually a critical component of protecting and organizations assets.
00:44
I left the opportunity eliminating network of on network going abilities.
00:49
So we're gonna cover choice
00:52
automation
00:53
technology
00:55
and lastly scalability.
00:59
So look at choice was first,
01:00
The choice you make for eliminating network vulnerabilities can have an impact on your compliance.
01:07
You want the two solutions that provide accurate reporting
01:11
and that meet the criteria of regulatory bodies.
01:15
Depending on your industry, you may have several regulations or stand that your organization has to follow,
01:21
like Sarbanes actually act in the financial industry
01:25
Hippo in the healthcare industry or PC I, the SS
01:30
indie credit card in this room.
01:34
Look at automation.
01:36
We want to automate our vulnerability and management as much as possible.
01:41
The main reasons for doing this or to save us time
01:45
using our resource that could be better dedicated elsewhere.
01:49
And automation may allow us to have better compliance,
01:53
since we would need to dedicate. Resource is if we were doing manual vulnerability management
01:59
that would also lead to a higher costs for the company.
02:04
Automation also reduces the likelihood of human error.
02:09
Let's look into technology
02:12
well, considering the tools you were used for eliminating network vulnerabilities, it is important to remember that you don't want to skimp on the technology
02:22
meaning
02:23
Don't be cheap.
02:24
You want to make sure you're chosen technology solution will show you meaningful data and will help the organization maintain compliance.
02:35
Now, not every tool is the same, and you also want to make sure you're using tools that are deemed safe across the industry.
02:46
Remember,
02:46
the tool is going to be scanning your network and looking that confidential data.
02:52
Do you really want to trust that random to you? Found any Google search?
02:57
Or would you rather use the same two as larger organizations across industry,
03:04
Remember,
03:05
is better to be safe than sorry.
03:09
Now let's look at scalability.
03:13
Any vulnerability, magical solution
03:15
that you need
03:16
uses the scalability
03:21
or basically has the needs for scalability for your organization.
03:25
So things like being able to support the growth of users on IT network and any increased complexity in the network architect.
03:35
The Vulnerability Mansion solution needs to be cost effective at scale, and the pay structure should be teared based off the numbers of users.
03:46
Now let's look at our pools Assessment
03:50
without vulnerability. Mansion solution.
03:53
We should focus solely on calls and not worry about the tools
03:57
our industry
03:59
of our industry standards.
04:00
Is this true
04:02
or is this false?
04:10
This is folks. Remember, we talked about the importance of using vulnerability management tools that are safe
04:16
while Coast is important. It should be the sole factor in determining the best vulnerability and management solution to use
04:28
case. And now we reached our summer.
04:30
It's okay, and it's really you. We talked about eliminating network vulnerabilities
04:35
and the things that we need to consider and making better choices above one ability management.
04:43
In the next video, we'll talk about the use of consultants and vulnerability management

Up Next

Fundamentals of Vulnerability Management

Most of the successful attacks through a business network could be prevented with vulnerability management. This course focuses on what you can do to automatically manage vulnerabilities and keep your network safe from attack.

Instructed By

Instructor Profile Image
Corey Charles
Founder of DreamVision IT LLC
Instructor