Skip to main content

Home Specialist skills Security LDR516: Building and Leading Vulnerability Management Programs

LDR516: Building and Leading Vulnerability Management Programs

  • bullet point
    Steps to create, implement, or mature your vulnerability management program and receive buy-in from your stakeholders
  • bullet point
    Techniques for building and maintaining an accurate and useful inventory of IT assets in the enterprise and the cloud
  • bullet point
    What identification processes and technologies are effective across both infrastructure and applications and how to configure them appropriately
  • bullet point
    Which common false positives or false negatives to be aware of in your identification arsenal
  • bullet point
    How to prioritize unblocked vulnerabilities for treatment based on a variety of techniques
  • bullet point
    Effectively report and communicate vulnerability data within your organization
  • bullet point
    Ability to identify and report on the risk associated with vulnerabilities that are blocked and cannot currently be prioritized for remediation
  • bullet point
    A better understanding of modern treatment capabilities and how to better engage with treatment teams
  • bullet point
    Talent for making vulnerability management more fun and engaging for all those involved
  • bullet point
    Differentiating how to deal with application layer vulnerabilities versus infrastructure vulnerabilities
  • bullet point
    An understanding of how our strategies and techniques might change as we move to the cloud, implement private cloud, or roll out DevOps within our organizations

Overview

Off the shelf (OTS)

Vulnerability, patch, and configuration management are not new enterprise security topics. In fact, they are some of the oldest security functions. Yet, we still struggle to manage security vulnerability capabilities effectively. The quantity of outstanding vulnerabilities for most enterprise organisations is overwhelming, and all organisations struggle to keep up with the never-ending onslaught of new security vulnerabilities in their infrastructure and applications. When you add in the cloud, and the increasing speed with which all organisations must deliver systems, applications, and features to both their internal and external customers, enterprise security may seem unachievable. This vulnerability management training course will show you the most effective ways to mature your vulnerability management program and move from identifying vulnerabilities to successfully treating them. 21 Cyber42 and 15 lab exercises.

Delivery method
Face to face icon

Face to face

Virtual icon

Virtual

Digital icon

Digital

Course duration
Duration icon

35 hours

Competency level
Working icon

Working

Pink building representing strand 4 of the campus map
Delivery method
  • face to face icon

    Face to face

  • Virtual icon

    Virtual

  • Digital icon

    Digital

Course duration
Duration icon

35 hours

Competency level
  • Working icon

    Working

chatbotSpark login