Leader in the cybersecurity training sector.

Operational Control of Vulnerability Management

Satisfaction rate
4.5
Success rate
4.9

Deploy a Compliant and Efficient Process according to ISO 27001, ISO 27002 and NIST

The target audience for training

  • IT managers and technicians, system and network administrators. 
  • Cybersecurity managers, CISOs, SOC or ITSM analysts. 
  • Anyone involved in safety or technical risk management. 

What you will learn

  • Set up a structured vulnerability management process in an IT environment. 
  • Understanding reference standards (ISO 27001, ISO 27002, NIST SP 800-40). 
  • Identify, assess and prioritise vulnerabilities in an operational cycle. 
  • Selecting and integrating better tools scanning and management (Nessus, OpenVAS, Qualys, etc.). 
  • Implement a continuous process of improvement and regulatory compliance. 
  • Acquire a clear, actionable method that complies with international best practice. 

Training programme

  • Welcome & introduction The challenges of vulnerability management
  • Norms and standards ISO 27001 / 27002, NIST SP 800-40, CIS Benchmarks
  • Vulnerability management cycle identification, analysis, remediation, monitoring
  • Lunch break
  • Overview of tools Nessus, OpenVAS, Qualys, Tenable, Rapid7
  • Practical workshop Design a management process based on ISO & NIST
  • Guided case study detection, analysis and response simulation
  • Conclusion best practice, pitfalls to avoid, action plan

Assessment procedures

  • MCQs at the end of the day on key concepts (standards, cycle, best practice). 
  • Assessment of the deliverables produced as part of the case studies. 

Teaching methods

  • Training led by a certified cyber security expert (ISO 27001 Lead Implementer / CEH...). 
  • Alternating theoretical presentations, tool demonstrations and practical workshops. 
  • Digital course material, process model provided, maturity assessment grid. 

Training objectives

At the end of the course, participants will be able to : 

  • Design a complete vulnerability management process that complies with ISO 27001, ISO 27002 and NIST guides. 
  • Map assets at risk and integrate scan results into a processing cycle. 
  • Choosing the right detection, assessment and remediation tools. 
  • Set up a structured reporting system and communicate effectively with management. 
  • Assess the maturity of their approach and build a continuous improvement plan. 

Training prerequisites

  • Basic knowledge of IT infrastructure and information systems security. 
  • No prior certification required. 

Tarif

2440 €
Book Now

Important information:

Our courses are not registered with the Répertoire National des Certifications Professionnelles (RNCP), but they do comply with the requirements of the Répertoire Spécifique (RS).

Réserver l’événement

icône Form/calendar icon
icône Form/ticket icon
1 personne
2440 €
icône Form/up small icon icône Form/down small icon
Billets disponibles: Illimité
Le billet de "1 personne" est épuisé. Vous pouvez essayer un autre billet ou une autre date.

We use cookies to improve your experience. See our Cookie policy and our Privacy policy.

Demande d’information

Je souhaite obtenir plus d'informations sur vos formations.
ACG CyberAcademy collecte et utilise les données fournies via ce formulaire afin de traiter vos demandes d'inscription. Les champs marqués d’un * sont indispensables. Les autres informations nous permettent d’optimiser le suivi de votre demande ainsi que la qualité de notre relation client.
* Pour en savoir plus et exercer vos droits, consultez notre Politique Vie privée.

Demande d’information

Je souhaite obtenir plus d'informations sur vos formations.
ACG CyberAcademy collecte et utilise les données fournies via ce formulaire afin de traiter vos demandes d'inscription. Les champs marqués d’un * sont indispensables. Les autres informations nous permettent d’optimiser le suivi de votre demande ainsi que la qualité de notre relation client.
* Pour en savoir plus et exercer vos droits, consultez notre Politique Vie privée.