To access material, start machines and answer questions login.
As per , a vulnerability (opens in new tab)is defined as "A weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source". In this room, we will learn the process of effectively identifying, detecting, mitigating, and reporting a vulnerability in a system in line with standard frameworks. The room entails a practical example through an open-source tool that will help us understand various vulnerability management lifecycle processes.
- Vulnerability management vs vulnerability scanning
- How are vulnerabilities classified?
- Processes of vulnerability management lifecycle
- How can we use a vulnerability management framework in cybersecurity?
An understanding of the following topics is recommended before starting the room:
Let's begin!
Ready to learn Cyber Security?
The Vulnerability Management room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in
