• Classrooms
    • Hybrid Cloud Security
    • Integrating SIEM and Incident Response
    • Targeted Attacks
    • Application Security
    • IoT Security
    • Enterprise IAM
    • Endpoint Security Controls
    • Next Gen Firewalls
    • Data Protection

Lesson 1:


Beaver explains why authenticated vunerability scanning is so important to your security program.

Looking past the login prompt

Lesson 2:


Learn about the vital information authenticated scans can provide.

Addressing today’s vulnerabilities

Lesson 3:


Learn the ins and outs when performing authenticated scans so you can ensure you're getting the most out of your vulnerability management program.

The gaping hole in your VM program

Lesson 4:


Learn how to successfully prepare and run authenticated vulnerability scans.

Get the most from your authenticated scans

Lesson 5:


Beaver explains what you should expect from your scans.

Nine things you need to know

Quiz:


Take this brief quiz to test your knowledge of the issues covered in the lessons that make up our classroom on vulnerability management

Vulnerability Management: Quiz

Vulnerability Management

From humble beginnings as a scan to see whether corporate endpoints are susceptible to the headline malware du jour, vulnerability management has evolved into toolsets that take a holistic view of all the various potential problems that it's impossible not to have on an enterprise-scale IT infrastructure. This Security School lesson featuring information security expert Kevin Beaver offers guidance on capabilities you may want to have when addressing vulnerabilities, for example support for authenticated vulnerability scans. He also looks at the current state of capabilities for remediation.

TOP

Kevin Beaver
Founder and Principal Information Security Consultant, Principle Logic, LLC

Kevin Beaver is an information security consultant, writer, professional, speaker and expert witness at Atlanta-based Principle Logic, LLC. With over 25 years of experience in the industry, Kevin specializes in performing independent security vulnerability assessments of network systems as well as Web and mobile applications. He has authored or co-authored a dozen books on information security, including the best-selling Hacking For Dummies.




Follow Us

15.4k
6.6k
2.5k

Contact Us

  • info@TechTarget.com
  • 275 Grove Street
    Newton, MA 02466
  • @TechTarget
  • (888) 274-4111