5-day email course
You will also be subscribed to Deploy Securely.
Who should take this?
Do you find yourself immersed in a sea of vulnerability scanner findings?
Is it challenging to communicate with your business counterparts about what having 382 "critical" vulnerabilities actually means? Do you even know what you mean?
Are you ready to just bury your head in the sand and pretend all of those overdue Jira tickets don't exist?
Daily lesson plan
Admitting you have a (CVE) problem
Confronting vulnerability overload with risk management
Putting a dollar figure on every vulnerability
Building a vulnerability management policy
Measuring vulnerability management success
© StackAware. All rights reserved.
Requirements and disclaimersPlease feel free to share this course, but if you do, you must direct others to this site, i.e. https://vulnerability.management, and no other location.We are not attorneys, accountants, or any type of government-licensed professional. We are not offering legal or accounting advice and advise you to contact the appropriately accredited person if that is what you are seeking. Everything provided as part of this course here is provided “AS IS” and without warranty; you accept all risk involved in implementing any recommendations offered.