Vulnerability management
5-day email course

You will also be subscribed to Deploy Securely.

Who should take this?

  • Do you find yourself immersed in a sea of vulnerability scanner findings?

  • Is it challenging to communicate with your business counterparts about what having 382 "critical" vulnerabilities actually means? Do you even know what you mean?

  • Are you ready to just bury your head in the sand and pretend all of those overdue Jira tickets don't exist?

Daily lesson plan

  1. Admitting you have a (CVE) problem

  2. Confronting vulnerability overload with risk management

  3. Putting a dollar figure on every vulnerability

  4. Building a vulnerability management policy

  5. Measuring vulnerability management success

© StackAware. All rights reserved.

Legal and Privacy | Security

Requirements and disclaimersPlease feel free to share this course, but if you do, you must direct others to this site, i.e., and no other location.We are not attorneys, accountants, or any type of government-licensed professional. We are not offering legal or accounting advice and advise you to contact the appropriately accredited person if that is what you are seeking. Everything provided as part of this course here is provided “AS IS” and without warranty; you accept all risk involved in implementing any recommendations offered.