Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn about vulnerability management implementation through a 39-minute conference talk from the Chaos Communication Congress (38C3) that explores the open-source tool DefectDojo. Discover how to integrate vulnerability finding, management, and mitigation into development workflows using various security tools including Trivy, Clair, Nessus, Sonar, and OWASP dependency tracker. Explore DefectDojo's capabilities in report consolidation, finding deduplication, false positive handling, and integration with development tracking software like Jira. Gain practical insights from a real-world implementation case study at a medium-sized critical infrastructure company, demonstrating the advantages and effectiveness of structured vulnerability management processes.
Syllabus
38C3 - Vulnerability management with DefectDojo
Taught by
media.ccc.de