From the course: Implementing a Vulnerability Management Lifecycle

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Creating the right core process

Creating the right core process

From the course: Implementing a Vulnerability Management Lifecycle

Start my 1-month free trial

Creating the right core process

- [Instructor] The next several videos will describe the core process of your vulnerability management program, the weekly vulnerability scan of your network. This process is a set of repeating steps that will allow you to establish a reliable, operational cadence. And this cadence must deliver the value you described when you made your business case. The first step is to check your network-attached devices to find out what vulnerabilities are actually on your network. But sitting down at each computer, server, and router and analyzing them by hand would take too much time. Fortunately, vulnerability scanners automate the discovery process. They connect to each device, or asset, on your network and determine their current vulnerabilities. The scanner looks at the asset's hardware, operating system, installed applications, and more. At the same time you also need to review your vulnerability data feeds, since those will…

Contents