The Fastest Way to Become a Backend Developer Online
MIT Sloan: Lead AI Adoption Across Your Organization — Not Just Pilot It
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Get a step-by-step process for finding, prioritizing, and mitigating the vulnerabilities in your computing environment, no matter what technology stack you're running.
Syllabus
Introduction
- Everyone needs a vulnerability management program
- What you should know
- Defining vulnerability management
- The benefits of vulnerability management
- Succeed by setting program goals
- Make a great business case
- Assign qualified people
- Step 1 case study
- Creating the right core process
- How to discover known vulnerabilities
- Generating actionable vulnerability reports
- Validate reported vulnerabilities
- Step 2 case study
- How to design effective mitigations
- How to fix vulnerabilities
- How to verify mitigation success
- Step 3 case study
- Next steps
Taught by
Kip Boyle