From the course: SecOps on Google Distributed Cloud (GDC) for Tier 3 Analysts by Google
Unlock this course with a free trial
Join today to access over 25,200 courses taught by industry experts.
The vulnerability management lifecycle - Google Cloud Platform Tutorial
From the course: SecOps on Google Distributed Cloud (GDC) for Tier 3 Analysts by Google
The vulnerability management lifecycle
- Vulnerability management follows a cyclical lifecycle in which you move from assessment to remediation towards ongoing evaluation of vulnerabilities. This continuous cycle is essential for maintaining robust security and compliance, as well as continuously adapting to new threats. So what are the steps that security analysts follow as an incident moves through vulnerability management lifecycle? You start with asset discovery in order to build and regularly update an inventory of your organization's assets. This includes versions and patch statuses. This sets the baseline for vulnerability identification. Next, prioritize your assets by risk and significance to your operations. Focus your efforts on the most critical assets. Then conduct vulnerability assessments based on asset exposure. Use public vulnerability lists to better understand risks and tailor your cybersecurity strategy accordingly. You'll learn more about…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
(Locked)
Module overview57s
-
(Locked)
Introduction to vulnerability management1m 35s
-
(Locked)
Vulnerability management systems (VMS)3m 41s
-
(Locked)
The vulnerability management lifecycle3m 11s
-
(Locked)
Vulnerability management on GDC5m 15s
-
(Locked)
Techniques for vulnerability management2m 45s
-
(Locked)
Vulnerability assessment4m 59s
-
(Locked)
Vulnerability scanning4m 5s
-
(Locked)
Penetration testing4m 16s
-
(Locked)
Tools for penetration testing1m 48s
-
(Locked)
Best practices for a vulnerability management program5m 54s
-
(Locked)
Vulnerability management reports1m 48s
-
(Locked)
Module summary56s
-
(Locked)
-
-
-