- Set a productive cadence for finding vulnerabilities.
- Automate your work with a vulnerability scanner.
- Assess the risk of a vulnerability and select a resolution.
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Managing vulnerabilities in your computing infrastructure is a critical success factor for blocking cyberattacks. In this learning path, discover how to find, prioritize, and fix vulnerabilities, as well as allocate your limited budget to manage seemingly unlimited cyber risks.
Syllabus
Courses under this program:
Course 1: Implementing a Vulnerability Management Lifecycle
-Get a step-by-step process for finding, prioritizing, and mitigating the vulnerabilities in your computing environment, no matter what technology stack you're running.
Course 2: Learning Vulnerability Management
-Learn the basics of vulnerability management. Discover why vulnerabilities exist, as well as how to manage them from start to finish.
Course 3: Security Testing Essential Training
-Learn about security testing. Learn how to set up a test environment, plan assessments, identify targets, and execute security tests with popular tools like Nmap and Wireshark.
Course 4: Security Testing: Vulnerability Management with Nessus
-Fix the flaws in your network before attackers can find them. Learn how to use Nessus, the network automated vulnerability scanner, to detect and resolve system vulnerabilities.
Course 5: Ethical Hacking: Vulnerability Analysis
-Manage risk by assessing vulnerabilities. Learn about the processes, methodologies, and tools you need to find and address weaknesses that attackers might exploit.
Course 6: Vulnerability Management: Assessing the Risks with CVSS v3.1
-Prioritize the vulnerabilities in your environment using the Common Vulnerability Scoring System (CVSS). Learn how to apply CVSS scores to effectively assess risk.
Course 1: Implementing a Vulnerability Management Lifecycle
-Get a step-by-step process for finding, prioritizing, and mitigating the vulnerabilities in your computing environment, no matter what technology stack you're running.
Course 2: Learning Vulnerability Management
-Learn the basics of vulnerability management. Discover why vulnerabilities exist, as well as how to manage them from start to finish.
Course 3: Security Testing Essential Training
-Learn about security testing. Learn how to set up a test environment, plan assessments, identify targets, and execute security tests with popular tools like Nmap and Wireshark.
Course 4: Security Testing: Vulnerability Management with Nessus
-Fix the flaws in your network before attackers can find them. Learn how to use Nessus, the network automated vulnerability scanner, to detect and resolve system vulnerabilities.
Course 5: Ethical Hacking: Vulnerability Analysis
-Manage risk by assessing vulnerabilities. Learn about the processes, methodologies, and tools you need to find and address weaknesses that attackers might exploit.
Course 6: Vulnerability Management: Assessing the Risks with CVSS v3.1
-Prioritize the vulnerabilities in your environment using the Common Vulnerability Scoring System (CVSS). Learn how to apply CVSS scores to effectively assess risk.
Courses
-
Fix the flaws in your network before attackers can find them. Learn how to use Nessus, the network automated vulnerability scanner, to detect and resolve system vulnerabilities.
-
Prioritize the vulnerabilities in your environment using the Common Vulnerability Scoring System (CVSS). Learn how to apply CVSS scores to effectively assess risk.
-
Learn the basics of vulnerability management. Discover why vulnerabilities exist as well as how to manage them from start to finish.
-
Learn about security testing. Learn how to set up a test environment, plan assessments, identify targets, and execute security tests with popular tools like Nmap and Wireshark.
-
Manage risk by assessing vulnerabilities. Learn about the processes, methodologies, and tools you need to find and address weaknesses that attackers might exploit.
-
Get a step-by-step process for finding, prioritizing, and mitigating the vulnerabilities in your computing environment, no matter what technology stack you're running.
Taught by
Kip Boyle, Lora Vaughn, Jerod Brennen, Mike Chapple and Lisa Bock