Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LinkedIn Learning

Implementing a Vulnerability Management Lifecycle

via LinkedIn Learning


Get a step-by-step process for finding, prioritizing, and mitigating the vulnerabilities in your computing environment, no matter what technology stack you're running.


  • Everyone needs a vulnerability management program
  • What you should know
1. Prepare for Vulnerability Management
  • Defining vulnerability management
  • The benefits of vulnerability management
2. Create the Vulnerability Management Program
  • Succeed by setting program goals
  • Make a great business case
  • Assign qualified people
  • Step 1 case study
3. Conduct Weekly Vulnerability Scans
  • Creating the right core process
  • How to discover known vulnerabilities
  • Generating actionable vulnerability reports
  • Validate reported vulnerabilities
  • Step 2 case study
4. Mitigate Found Vulnerabilities
  • How to design effective mitigations
  • How to fix vulnerabilities
  • How to verify mitigation success
  • Step 3 case study
  • Next steps

Taught by

Kip Boyle


4.7 rating at LinkedIn Learning based on 87 ratings

Start your review of Implementing a Vulnerability Management Lifecycle

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.