Keeping an information system secure is an essential and continual process to stop potential threats. In this course, Vulnerability Management: The Big Picture, you'll learn the vulnerability management process and how it fits into an information security plan. First, you'll discover the importance of conducting regular vulnerability scans. Next, you'll explore how to prioritize vulnerability remediation. Finally, you'll delve into some tools that are available to help you automate these processes. By the end of this course, you'll have developed a deeper understanding of the basics of the vulnerability management process and the importance of its implementation.
- Preparation and Scanning
- Vulnerability Analysis
- Prioritization and Reporting
- Remediation and Mitigation
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.