wird in neuem Tab geöffnet
E-Medium
Implementing a Vulnerability Management Lifecycle
Verfasser:
Suche nach diesem Verfasser
Boyle, Kip (Verfasser)
Mehr...
Jahr:
2020
Verlag:
LinkedIn
Mediengruppe:
EMedien
Vorbestellbar:
Ja
Nein
Voraussichtlich entliehen bis:
Download
Zum Download von externem Anbieter wechseln - wird in neuem Tab geöffnet
Standorte | Status | Vorbestellungen | Frist |
Standorte:
|
Status:
Verfügbar
|
Vorbestellungen:
0
|
Frist:
|
In the past several years, a series of devastating cyberattacks have periodically dominated headlines. While each attack affected different industries and governments, they shared the same root cause: unfixed-but publicly known-vulnerabilities. In this course, get a step-by-step process for finding, prioritizing, and mitigating the vulnerabilities in your own computing environment, no matter what technology stack you're running. Instructor Kip Boyle shows how to prepare for and create a robust vulnerability management program, explaining how to set program goals and secure funding by creating a compelling business case. Kip also covers how to conduct weekly vulnerability scans, as well as mitigate any vulnerabilities that crop up. Along the way, Kip shares case studies that illustrate how a real-world organization would approach each step in this process.
Keine Rezensionen gefunden.
Mehr...
Jahr:
2020
Verlag:
LinkedIn
Aufsätze:
Zu diesem Aufsatz wechseln
Suche nach dieser Systematik
Suche nach diesem Interessenskreis
Beschreibung:
00:42:28
Suche nach dieser Beteiligten Person
Sprache:
Englisch
Mediengruppe:
EMedien