Introduction to Vulnerability Management
3.4 (120 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
311 students enrolled

Introduction to Vulnerability Management

Risk Management Fundamentals
3.4 (120 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
311 students enrolled
Created by Corey Charles
Last updated 10/2018
English [Auto-generated]
Current price: $135.99 Original price: $194.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 4 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Assessment of vulnerabilities in specific environments
  • Process of Vulnerability Management with different enterprise infrastructures
  • Understand the multiple frameworks associated with government and private industry infrastructures
  • Risk Management Framework
  • Certification and Accreditation
  • Risk Analysis
  • Qualitative Management
  • Quantitative Management
  • Students should have general understanding of IT Security
  • Understand the concepts of Vulnerability Management

The course covers the basics of Vulnerability Management. The course dives into detail information of on the critical issues of vulnerabilities. It covers risk management and covers the basis of penetration testing vs vulnerability management as well. The course also includes lab simulation of vulnerability management processes. The lab introduces the students to Nessus and how vulnerabilities are tracked in the security scanner based on the respective critical level.

Who this course is for:
  • Entry- Seasoned IT Security Professionals
  • New IT professionals
  • IT Consultants
  • IT Administrators
  • Program Managers
  • IT Decision Makers
  • Program Directors
  • Security Engineers
  • Security Architects
Course content
Expand all 28 lectures 03:46:26
+ Introduction to Vulnerability Management
1 lecture 02:01

Corey Charles is a seasoned IT Security professional with ten years of experience. His expertise is in the Vulnerability Management area of IT Security. Mr. Charles has worked on many contracts and projects supporting government, healthcare and private sector clients. He has worked in many infrastructures and applied a large range of compliance standards across many enterprises. 

Mr. Charles is the Founder/CEO/Owner of DreamVision IT LLC. He is recognized for diligence, attention to detail and skills accessing vulnerabilities in environments such as linux, unix, citrix and windows. Mr. Charles has been recognized by multiple clients as a subject matter expert in vulnerability management. Corey, has taught on the college level, teaching ethical hacking, network security, fundamentals of networking and web application development to name a few courses. 

In closing, Mr. Charles is an industry certified, educational verified and client based testified expert in vulnerability management and IT Security.

Preview 02:01
+ ACT I: Basics of Vulnerability Management
7 lectures 28:47
Introduction to Become an Expert in Vulnerability Management
Five Principles of Threat Based Security

The management of end-of-life storage assets represents a relatively untouched sector of the compliance market, making it a prime service opportunity for solution providers. Learn about this field and how to establish effective decommissioning policies and procedures for your clients.

Preview 02:46
The Security TRIAD
Attack Vector
Post Compromise/ Threat
+ ACT II: Types of Vulnerabilities
7 lectures 42:21
TCP/IP Vulnerabilities
IP Vulnerabilities
ICMP Vulnerabilties
TCP Vulnerabilities
TCP Session HiJacking
UDP Vulnerabilties
+ ACT III: Penetration Testing vs Vulnerability Management
3 lectures 13:42

In this lecture, we are walking thru the patch management process step by step.

Penetration Testing vs Vulnerability Management
Predicting Vulnerabilties
Poor Logging Vulnerability
+ Vulnerability Management Lab
5 lectures 01:18:35
Preliminary Scanning with NMAP
NESSUS Scanner Lab
Wireshark Lab
Vulnerability Analysis Lab
Cryptography Lab
+ Penetration Testing Lab
3 lectures 59:27
Basic Scanning
Identifying System Vulnerabilities with OpenVAS
Analyzing SQL Attack
+ Course Summary
2 lectures 01:33

We will cover the Vulnerability Management and Assessment Process.

Thank You for Attending
Bonus For Students!