Most of the successful attacks through a business network could be prevented with vulnerability management. This course focuses on what you can do to automatically manage vulnerabilities and keep your network safe from attack.
Learning Objectives
By the end of this course, students should be able to:
- Understand different types of vulnerabilities
- Understand different types of vulnerability assessments
- Understand the vulnerability management life cycle