Skill Level Intermediate
- [Kip] Publicly known but unfixed vulnerabilities continue to be a top source of data breaches and other cyber attacks. An unpatched vulnerability was how John Doe obtained the Panama papers. It's how Chinese cyber attackers caused the massive data breach at the US credit bureau, Equifax and it's how the people who released the crypto disk wiping worm NotPetya quickly caused over $10 billion in damages around the world. In this practical course, you'll learn a step-by-step process for finding, prioritizing, and mitigating the vulnerabilities in your computing environment no matter what technology stack you're using. Hi, I'm Kip Boye, I'm a Chief Information Security Officer and the host of the Cyber Risk Management Podcast and I've helped lots of organizations implement and operate their vulnerability management programs. This course will provide you with insights and practical steps so you can create or improve your own vulnerability management program. If you've struggled to manage vulnerabilities before or if your boss just told you to start a program my course will set you up for success. Let's get going.