Are you interested in being part of the wider roll out for Spark, our new AI-powered, learning chatbot? Register your interest here.
Home Specialist skills Security LDR516: Building and Leading Vulnerability Management Programs
LDR516: Building and Leading Vulnerability Management Programs
-
Steps to create, implement, or mature your vulnerability management program and receive buy-in from your stakeholders
-
Techniques for building and maintaining an accurate and useful inventory of IT assets in the enterprise and the cloud
-
What identification processes and technologies are effective across both infrastructure and applications and how to configure them appropriately
-
Which common false positives or false negatives to be aware of in your identification arsenal
-
How to prioritize unblocked vulnerabilities for treatment based on a variety of techniques
-
Effectively report and communicate vulnerability data within your organization
-
Ability to identify and report on the risk associated with vulnerabilities that are blocked and cannot currently be prioritized for remediation
-
A better understanding of modern treatment capabilities and how to better engage with treatment teams
-
Talent for making vulnerability management more fun and engaging for all those involved
-
Differentiating how to deal with application layer vulnerabilities versus infrastructure vulnerabilities
-
An understanding of how our strategies and techniques might change as we move to the cloud, implement private cloud, or roll out DevOps within our organizations
Overview
Off the shelf (OTS)
Vulnerability, patch, and configuration management are not new enterprise security topics. In fact, they are some of the oldest security functions. Yet, we still struggle to manage security vulnerability capabilities effectively. The quantity of outstanding vulnerabilities for most enterprise organisations is overwhelming, and all organisations struggle to keep up with the never-ending onslaught of new security vulnerabilities in their infrastructure and applications. When you add in the cloud, and the increasing speed with which all organisations must deliver systems, applications, and features to both their internal and external customers, enterprise security may seem unachievable. This vulnerability management training course will show you the most effective ways to mature your vulnerability management program and move from identifying vulnerabilities to successfully treating them. 21 Cyber42 and 15 lab exercises.
Delivery method
Face to face
Virtual
Digital
Course duration
35 hours
Competency level
Working
Delivery method
-
Face to face
-
Virtual
-
Digital
Course duration
35 hours
Competency level
-
Working