From the course: Implementing a Vulnerability Management Lifecycle
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
How to design effective mitigations
From the course: Implementing a Vulnerability Management Lifecycle
How to design effective mitigations
- [Instructor] Now you're ready to design mitigations for the vulnerable systems. I say design because mitigations require planning and testing before being rolled out to your entire company. Usually, a vulnerability can be mitigated by installing a security update, which requires a software patch to be deployed. It's called a patch because it covers a hole or a flaw in the system. In fact, that's why the monthly security updates for Microsoft is called Patch Tuesday. But what if there is no patch for a vulnerability on your list? Well now you need to do some digging. To guide you, I've provided you with a mitigation plan template that you can download and use to document your work. I'll follow the template over the next few videos as we mitigate the tougher vulnerabilities. The first step in creating a patch-free mitigation plan is to understand the vulnerability being mitigated. If your scan report doesn't provide…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.