From the course: Mitigating Cybersecurity Vulnerabilities

Unlock the full course today

Join today to access over 24,900 courses taught by industry experts.

Continuing to identify and assess vulnerabilities

Continuing to identify and assess vulnerabilities

From the course: Mitigating Cybersecurity Vulnerabilities

Continuing to identify and assess vulnerabilities

- All right, you finished the course. Now you know how to identify and assess vulnerabilities so you can smartly decide whether to fix, mitigate, or accept the vulnerabilities that threaten you. And you know how to follow a systematic approach and use data to prioritize the vulnerabilities that need fixing or mitigating. And this means you can deal effectively with the thousands of vulnerabilities coming at you every month. I encourage you to share this course with other members of your team so you can get as much support from them as possible. If you want to know more about how vulnerability scanners work, watch the OpenVAS videos in "Learning Kali Linux" by Malcolm Shore right here in the LinkedIn Learning Library. Or if you need to create an entire vulnerability management program from top to bottom, check out my course "Implementing a Vulnerability Management Program," which is also right here in the LinkedIn Learning Library. And if you'd like to learn more about how to manage…

Contents