Introduction to Vulnerability Management
3.4 (120 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
311 students enrolled

Introduction to Vulnerability Management

Risk Management Fundamentals
3.4 (120 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
311 students enrolled
Created by Corey Charles
Last updated 10/2018
English
English [Auto-generated]
Current price: $135.99 Original price: $194.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 4 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Assessment of vulnerabilities in specific environments
  • Process of Vulnerability Management with different enterprise infrastructures
  • Understand the multiple frameworks associated with government and private industry infrastructures
  • Risk Management Framework
  • Certification and Accreditation
  • Risk Analysis
  • Qualitative Management
  • Quantitative Management
Requirements
  • Students should have general understanding of IT Security
  • Understand the concepts of Vulnerability Management
Description

The course covers the basics of Vulnerability Management. The course dives into detail information of on the critical issues of vulnerabilities. It covers risk management and covers the basis of penetration testing vs vulnerability management as well. The course also includes lab simulation of vulnerability management processes. The lab introduces the students to Nessus and how vulnerabilities are tracked in the security scanner based on the respective critical level.

Who this course is for:
  • Entry- Seasoned IT Security Professionals
  • New IT professionals
  • IT Consultants
  • IT Administrators
  • Program Managers
  • IT Decision Makers
  • Program Directors
  • Security Engineers
  • Security Architects
Course content
Expand all 28 lectures 03:46:26
+ Introduction to Vulnerability Management
1 lecture 02:01

Corey Charles is a seasoned IT Security professional with ten years of experience. His expertise is in the Vulnerability Management area of IT Security. Mr. Charles has worked on many contracts and projects supporting government, healthcare and private sector clients. He has worked in many infrastructures and applied a large range of compliance standards across many enterprises. 

Mr. Charles is the Founder/CEO/Owner of DreamVision IT LLC. He is recognized for diligence, attention to detail and skills accessing vulnerabilities in environments such as linux, unix, citrix and windows. Mr. Charles has been recognized by multiple clients as a subject matter expert in vulnerability management. Corey, has taught on the college level, teaching ethical hacking, network security, fundamentals of networking and web application development to name a few courses. 

In closing, Mr. Charles is an industry certified, educational verified and client based testified expert in vulnerability management and IT Security.

Preview 02:01
+ ACT I: Basics of Vulnerability Management
7 lectures 28:47
Introduction to Become an Expert in Vulnerability Management
00:33
Risk
04:09
Five Principles of Threat Based Security
03:21

The management of end-of-life storage assets represents a relatively untouched sector of the compliance market, making it a prime service opportunity for solution providers. Learn about this field and how to establish effective decommissioning policies and procedures for your clients.

Preview 02:46
The Security TRIAD
06:01
Attack Vector
04:51
Post Compromise/ Threat
07:06
+ ACT II: Types of Vulnerabilities
7 lectures 42:21
TCP/IP Vulnerabilities
05:49
IP Vulnerabilities
06:35
ICMP Vulnerabilties
04:57
TCP Vulnerabilities
06:01
TCP Session HiJacking
04:11
UDP Vulnerabilties
06:55
+ ACT III: Penetration Testing vs Vulnerability Management
3 lectures 13:42

In this lecture, we are walking thru the patch management process step by step.

Penetration Testing vs Vulnerability Management
05:49
Predicting Vulnerabilties
05:19
Poor Logging Vulnerability
02:34
+ Vulnerability Management Lab
5 lectures 01:18:35
Preliminary Scanning with NMAP
22:01
NESSUS Scanner Lab
05:50
Wireshark Lab
08:12
Vulnerability Analysis Lab
22:46
Cryptography Lab
19:46
+ Penetration Testing Lab
3 lectures 59:27
Basic Scanning
11:42
Identifying System Vulnerabilities with OpenVAS
16:16
Analyzing SQL Attack
31:29
+ Course Summary
2 lectures 01:33

We will cover the Vulnerability Management and Assessment Process.

Thank You for Attending
00:38
Bonus For Students!
00:55