From the course: Implementing a Vulnerability Management Lifecycle
Unlock the full course today
Join today to access over 22,700 courses taught by industry experts or purchase this course individually.
Step 3 case study
From the course: Implementing a Vulnerability Management Lifecycle
Step 3 case study
- [Instructor] Let's check back in with our case study team, and see how they did mitigating some of the vulnerabilities they found. You may remember that their first routine scan report showed over 2,500 vulnerabilities across dozens of hosts, and that they calculated they needed 232 labor hours just to clear the backlog of the 1,389 severity three, four, and five vulnerabilities on their list. Eventually, they figured out that there were security patches available for over 90% of the vulnerabilities. Of the rest, there were three typical situations that they had to face. The first type was the same as the severe Dropbear SSH vulnerability that we looked at in a previous video. As I mentioned back then, the scan report did not show there was a patch available, so the team looked up the CVE and found more details. A link in the CVE record showed an article that explained the Dropbear packages simply needed to be…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.