Cybersecurity and Vulnerability Management Strategy - WATCH BEFORE YOUR INTERVIEW

preview_player
Показать описание
🔒 Josh's Hands-On Cybersecurity / SOC Analyst Training (REAL EXPERIENCE)🔒
Discount Code: JOSH10

---

📄 Security+ Practice Questions Deck 📄 (SY0-701)

📄 CISSP Practice Questions Deck 📄

🗣️ Vulnerability Management Interview Questions 🗣️

📃 Sample Vulnerability Management Policy 📃

---

How to Build a Vulnerability Management Program

Discover the essentials of vulnerability management in large organizations in this comprehensive video. Designed to prepare you for cybersecurity interviews, especially in vulnerability management roles, this video will help you understand what vulnerability management is, how to set up a vulnerability management program, and the lifecycle of vulnerability management.

Topics include understanding what a vulnerability is, high-level steps that go into standing up a vulnerability management function in a large organization, and 10 essential interview questions related to vulnerability management. A must-watch for anyone interested in cybersecurity, or preparing for an interview in this domain.

This video is part of a hands-on cybersecurity/SOC analyst course where you can build an actual mini SOC in Azure, configure a SIEM from scratch, and practice incident response against actual live attackers. The course is linked in the description along with a discount code.

The video begins with defining a vulnerability and explaining vulnerability management in detail. It outlines the challenges often faced in large organizations when it comes to vulnerability management, due to deprecated software and human resistance.

The video further breaks down the vulnerability management lifecycle, referencing a detailed infographic. It talks about the strategic steps required for program establishment, such as initial planning, drafting a policy, asset identification and classification, procurement of a product and its initial configuration.

It emphasizes the importance of being transparent when interviewing individual departments, informing them about the implementation of a vulnerability management program, the requirements for ongoing remediation efforts, and the training necessary for all relevant staff.

The video also covers the tough but crucial stages of initial scanning, assessment, and the remediation cycle. It provides insight into the complexity of this phase and the need for robust support from upper management to overcome resistance and manage change effectively.

Links are included in the description for a sample vulnerability management policy, an example of a criticality chart, and a visual guide for the remediation cycle.
Рекомендации по теме
Комментарии
Автор

🔒 Josh's Hands-On Cybersecurity / SOC Analyst Training (REAL EXPERIENCE)🔒

JoshMadakor
Автор

Just finished your course now getting ready start the internship and study for comptia security+. Great course man "hopefully I can help you edit this course".

Tushaethomas
Автор

Loving the new background, TV and Plants, a vibe. Good content. Congrats at 100k. Happy to be "OG" lol.

PluPerfective
Автор

I want to thank you for the level of detail in this video. Everything I found very useful. I would really like another deep dive into that home lab again.If you can find the time that would be great!!

g.rajifuja
Автор

Thanks for the videos. You do a lot for the community of aspiring Cyber professionals.

granddeception
Автор

Came here to learn but your voice is something else 😊😅

PhileoCoffeeVillage
Автор

At the company I worked at, the network team prohibited the security team from performing vulnerability scanning over the wan because, as they put it, vulnerability scanning ‘clogs up the logs’

Which is obviously utter nonsense.

Basically the managers on the IT security team were too chickensh!+ to push back when they should have.

As a result, we had 20+ local scanning engine servers throughout the org. It was a complete management nightmare.

PullUps
Автор

How can I build my sql skills as I don't have a VM of sql but use it for work but need to learn more queries

davidpetrell
Автор

Hi Josh. This is a very valuable and very well explained VM process video. Does your Cyber course include VM?

wisdomandpeace
Автор

Can you point me to a video or will you be making a video in the future about aquiring experience. Most employers are asking for 2 years exp or a Bachelors degree.

gened
Автор

Thanks for the information it was very helpful. but I've not been able to download the first two documents.
CISSP Practice questions and the CompTIA security plus practice questions. Thanks.

drdre
Автор

Ive been following you channel for a while now and am interested in taking your course. I am lookin at a few options now. I have Sec + and PCI DSS training. Is this a class schedule or self paced course? Love the knowledge here!

D-Unique
Автор

I swear i hate dealing with vendors for the very reason you mentioned, they can never just give an actual quote 😭 They like to wait and see what your organization’s budget is so they don’t end up “lowballing” themselves.

Rb_Laden
Автор

How are you handling vulnerabilities that does not have any patch available yet?

sergilao
Автор

Thank you for creating this. I’ve been struggling to break ground and this reignited my passion. 🫵🏾 da man!

love
Автор

Hi Josh,
You mentioned a discount code in your video. But i don't see it in the description or chat.
Can you help please.
Thanks

teea
Автор

I am just getting into VM in Cybersecurity with Qualys. i have a couple questions that i'd appreciate answers to. How long do you think it will take me to finish the total VM course in order to get a job. also how long does it usually take to get a job as a VM? Anyone please and thanks.

gideonmomodu
Автор

For me, the most problematic step is to provide scanner access to the assets. Then you need to take accounts for internal testing for vulnerabilities, but you just won’t get them because the administrator responsible for this is gouging and doesn’t know even half of the data from devices

ainurkhairullin
Автор

If you have a non tech related bachelors degree (Psychology), do you recommend getting another bachelors degree from WGU in IT management or going straight to the masters degree in cybersecurity?

Techcram
Автор

Josh do you currently have a course on this ? Or in the future see you going to give us a course in vulnerability management ?

Going in depth hands on .

artur_tx