Implementing a Vulnerability Management Lifecycle Preview

Implementing a Vulnerability Management Lifecycle

With Kip Boyle Liked by 374 users
Duration: 42m Skill level: Intermediate Released: 6/18/2020

Start my 1-month free trial

Course details

In the past several years, a series of devastating cyberattacks have periodically dominated headlines. While each attack affected different industries and governments, they shared the same root cause: unfixed—but publicly known—vulnerabilities. In this course, get a step-by-step process for finding, prioritizing, and mitigating the vulnerabilities in your own computing environment, no matter what technology stack you're running. Instructor Kip Boyle shows how to prepare for and create a robust vulnerability management program, explaining how to set program goals and secure funding by creating a compelling business case. Kip also covers how to conduct weekly vulnerability scans, as well as mitigate any vulnerabilities that crop up. Along the way, Kip shares case studies that illustrate how a real-world organization would approach each step in this process.

Skills you’ll gain

Meet the instructor

Learner reviews

4.7 out of 5

327 ratings
  • 5 star
    Current value: 257 78%
  • 4 star
    Current value: 59 18%
  • 3 star
    Current value: 9 2%
  • 2 star
    Current value: 0 0%
  • 1 star
    Current value: 2 <1%

Contents

What’s included

  • Practice while you learn 1 exercise file
  • Test your knowledge 4 quizzes
  • Learn on the go Access on tablet and phone

Similar courses

Download courses

Use your iOS or Android LinkedIn Learning app, and watch courses on your mobile device without an internet connection.