Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Vulnerability Management: Build Strong Cybersecurity Defense
Introduction to Vulnerability Management
What is Vulnerability Management? (3:46)
Vulnerability Management Lifecycle (2:25)
Quiz
Vulnerability Scanning Methods and Concepts
Asset Discovery (6:09)
Scanning Types Internal vs. External (10:38)
Credentialed vs. Non-Credentialed Scanning (9:41)
Active vs. Passive Scanning (10:02)
Vulnerability Scanning Tools (2:37)
Special Considerations in Vulnerability Scanning (5:49)
Agent vs. Agentless Scanning (9:29)
Static vs. Dynamic Analysis (9:01)
Quiz
Vulnerability Assessment and Tools
Analyzing Vulnerability Assessment Tools (6:03)
Network Scanning and Mapping Tools (9:45)
Web Application Scanners (16:34)
Vulnerability Scanners (7:21)
Multipurpose Tools (10:28)
Cloud Infrastructure Assessment Tools (7:18)
Debugging Tools for Vulnerability Assessment (8:12)
Quiz
Vulnerability Prioritization and Analysis
CVSS (Common Vulnerability Scoring System) (13:48)
Validation of Vulnerabilities (7:18)
Context Awareness (6:09)
Prioritizing Vulnerabilities (9:50)
Exploitability and Weaponization (7:08)
Assessing Asset Value in Vulnerability Management (6:29)
Quiz
Vulnerability Mitigation Techniques
Mitigating Software Vulnerabilities (23:10)
Common Attack Vectors and Controls (8:41)
Patching and Configuration Management (11:56)
Risk Management in Vulnerability Handling (11:50)
Data Poisoning and Attack Vectors (7:54)
Broken Access Control and Other Vulnerabilities (27:54)
Insecure Design and Security Misconfiguration (18:13)
Vulnerabilities Related to Outdated Components (8:04)
Identification and Authentication Failures (10:44)
Server-Side and Client-Side Vulnerabilities (8:31)
Local File Inclusion (LFI) and Remote File Inclusion (RFI) (7:44)
Remote Code Execution and Privilege Escalation (9:26)
Quiz
Advanced Vulnerability Management Topics
Vulnerability Handling in Cloud Environments (15:42)
Zero-day Vulnerabilities (9:24)
Industry Standards and Frameworks (31:12)
Industrial Control Systems (ICS) and SCADA Vulnerabilities (20:57)
Quiz
Vulnerability Response and Reporting
Post-Vulnerability Assessment Reporting (11:41)
Vulnerability Response Process (12:56)
Control Types in Vulnerability Management (9:32)
Maintenance Windows and Exceptions (12:28)
Policies, Governance, and Service-Level Objectives (SLOs) (7:52)
Prioritization and Escalation in Vulnerability Response (8:27)
Secure Software Development Life Cycle (SDLC) (5:52)
Secure Coding Best Practices (8:31)
Threat Modeling (5:40)
Quiz
Vulnerability Scanners
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock