- Set a productive cadence for finding vulnerabilities.
- Automate your work with a vulnerability scanner.
- Assess the risk of a vulnerability and select a resolution.
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Managing vulnerabilities in your computing infrastructure is a critical success factor for blocking cyberattacks. In this learning path, discover how to find, prioritize, and fix vulnerabilities, as well as allocate your limited budget to manage seemingly unlimited cyber risks.
Syllabus
Courses under this program:
Course 1: Vulnerability Management in Cybersecurity: The Basics
-Learn the basics of vulnerability management. Discover why vulnerabilities exist as well as how to manage them from start to finish.
Course 2: Security Testing Essential Training (2022)
-Learn about security testing. Learn how to set up a test environment, plan assessments, identify targets, and execute security tests with popular tools like Nmap and Wireshark.
Course 3: Vulnerability Management with Nessus
-Fix the flaws in your network before attackers can find them. Learn how to use Nessus, the network automated vulnerability scanner, to detect and resolve system vulnerabilities.
Course 4: Ethical Hacking: Vulnerability Analysis
-Manage risk by assessing vulnerabilities. Learn about the processes, methodologies, and tools you need to find and address weaknesses that attackers might exploit.
Course 5: Vulnerability Management: Assessing the Risks with CVSS v3.1
-Prioritize the vulnerabilities in your environment using the Common Vulnerability Scoring System (CVSS). Learn how to apply CVSS scores to effectively assess risk.
Course 6: Red Teaming for Generative AI: Building Robust and Responsible Solutions
-Learn how to plan and implement red teaming to enhance security, improve reliability, and encourage ethical behavior in your generative AI solutions.
Course 1: Vulnerability Management in Cybersecurity: The Basics
-Learn the basics of vulnerability management. Discover why vulnerabilities exist as well as how to manage them from start to finish.
Course 2: Security Testing Essential Training (2022)
-Learn about security testing. Learn how to set up a test environment, plan assessments, identify targets, and execute security tests with popular tools like Nmap and Wireshark.
Course 3: Vulnerability Management with Nessus
-Fix the flaws in your network before attackers can find them. Learn how to use Nessus, the network automated vulnerability scanner, to detect and resolve system vulnerabilities.
Course 4: Ethical Hacking: Vulnerability Analysis
-Manage risk by assessing vulnerabilities. Learn about the processes, methodologies, and tools you need to find and address weaknesses that attackers might exploit.
Course 5: Vulnerability Management: Assessing the Risks with CVSS v3.1
-Prioritize the vulnerabilities in your environment using the Common Vulnerability Scoring System (CVSS). Learn how to apply CVSS scores to effectively assess risk.
Course 6: Red Teaming for Generative AI: Building Robust and Responsible Solutions
-Learn how to plan and implement red teaming to enhance security, improve reliability, and encourage ethical behavior in your generative AI solutions.
Taught by
Kip Boyle, Lora Vaughn, Jerod Brennen, Mike Chapple, Lisa Bock and Lora Vaughn