From the course: Cybersecurity Foundations: Security Architecture
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
Collecting your core vulnerability management capabilities
From the course: Cybersecurity Foundations: Security Architecture
Collecting your core vulnerability management capabilities
- [Instructor] The vulnerability management discipline incorporates both the most common and tedious functions of a cybersecurity program. It is both unforgiving in its need for perfection and tedious in its need for continuous management. Any dynamic computing environment is going to have constant changes in configuration and vulnerable deployments that must be prioritized and addressed in a proper program. Let's look at some core capabilities of vulnerability management. First, we'll identify the elements or objects associated with the vulnerability management discipline. Then we'll look at the administrative tools available to support the discipline and provide automated capabilities. And finally, we'll identify the real time solutions available to protect our computing environment. We have four core vulnerability management elements. First, we have the scanners that search for vulnerabilities. Then we have the…