Most of the successful attacks through a business network could be prevented with vulnerability management. This course focuses on what you can do to automatically manage vulnerabilities and keep your network safe from attack.
By the end of this course, students should be able to:
Understand different types of vulnerabilities
Understand different types of vulnerability assessments
Understand the vulnerability management life cycle