Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Vulnerability Management with DefectDojo - Introduction and Implementation

media.ccc.de via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn about vulnerability management implementation through a 39-minute conference talk from the Chaos Communication Congress (38C3) that explores the open-source tool DefectDojo. Discover how to integrate vulnerability finding, management, and mitigation into development workflows using various security tools including Trivy, Clair, Nessus, Sonar, and OWASP dependency tracker. Explore DefectDojo's capabilities in report consolidation, finding deduplication, false positive handling, and integration with development tracking software like Jira. Gain practical insights from a real-world implementation case study at a medium-sized critical infrastructure company, demonstrating the advantages and effectiveness of structured vulnerability management processes.

Syllabus

38C3 - Vulnerability management with DefectDojo

Taught by

media.ccc.de

Reviews

Start your review of Vulnerability Management with DefectDojo - Introduction and Implementation

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.