Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn how to stay up-to-date with software and all the latest published vulnerabilities. In this course, you will learn the setup, configuration, and validation of OpenCVE in an enterprise environment.
Every day, numerous vulnerabilities are being published. If you use, install, or maintain software, it is hard to keep up-to-date. In this course, Risk Assessment with OpenCVE, you'll cover how to utilize OpenCVE to secure a live enterprise environment. First, you'll demonstrate how to install OpenCVE. Next, you'll apply specific configurations which will alert you when vulnerabilities are published for software you use. Finally, you'll simulate how to query the database for specific software or products. When you're finished with this course, you'll have the skills and knowledge to identify, protect, detect, or respond to threats in your network systems.
Every day, numerous vulnerabilities are being published. If you use, install, or maintain software, it is hard to keep up-to-date. In this course, Risk Assessment with OpenCVE, you'll cover how to utilize OpenCVE to secure a live enterprise environment. First, you'll demonstrate how to install OpenCVE. Next, you'll apply specific configurations which will alert you when vulnerabilities are published for software you use. Finally, you'll simulate how to query the database for specific software or products. When you're finished with this course, you'll have the skills and knowledge to identify, protect, detect, or respond to threats in your network systems.