Python, Prompt Engineering, Data Science — Build the Skills Employers Want Now
AI Engineer - Learn how to integrate AI into software applications
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Learn about vulnerability management implementation through a 39-minute conference talk from the Chaos Communication Congress (38C3) that explores the open-source tool DefectDojo. Discover how to integrate vulnerability finding, management, and mitigation into development workflows using various security tools including Trivy, Clair, Nessus, Sonar, and OWASP dependency tracker. Explore DefectDojo's capabilities in report consolidation, finding deduplication, false positive handling, and integration with development tracking software like Jira. Gain practical insights from a real-world implementation case study at a medium-sized critical infrastructure company, demonstrating the advantages and effectiveness of structured vulnerability management processes.
Syllabus
38C3 - Vulnerability management with DefectDojo
Taught by
media.ccc.de