From the course: Implementing a Vulnerability Management Lifecycle

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Step 2 case study

Step 2 case study

From the course: Implementing a Vulnerability Management Lifecycle

Start my 1-month free trial

Step 2 case study

- [Instructor] Let's check in with our case study team and see how they did setting up their weekly vulnerability scans. After setting up a scanner inside their internal network, they identified the assets that needed scanning. After they completed the first few test scans, they looked for any trouble their scanning may be causing to others. Fortunately, the network performance during the scans remained stable. But the network firewalls picked up the scans and alerted the administrators. Setting off alerts made sense since cyber attackers conduct automated scans, but it was unexpected by the case study team because they hadn't predicted all the possible impacts of their scans. Since they already had a good working relationship with the firewall administrators, this was quickly resolved. Finally, the reports were generated showing the vulnerabilities ordered by severity. And there was an overwhelming number of them. This…

Contents