Leader in the cybersecurity training sector.

Operational Control of Vulnerability Management

Satisfaction rate
4.5
Success rate
4.9

Deploy a Compliant and Efficient Process according to ISO 27001, ISO 27002 and NIST

The target audience for training

  • IT managers and technicians, system and network administrators. 
  • Cybersecurity managers, CISOs, SOC or ITSM analysts. 
  • Anyone involved in safety or technical risk management. 

What you will learn

  • Set up a structured vulnerability management process in an IT environment. 
  • Understanding reference standards (ISO 27001, ISO 27002, NIST SP 800-40). 
  • Identify, assess and prioritise vulnerabilities in an operational cycle. 
  • Selecting and integrating better tools scanning and management (Nessus, OpenVAS, Qualys, etc.). 
  • Implement a continuous process of improvement and regulatory compliance. 
  • Acquire a clear, actionable method that complies with international best practice. 

Training programme

  • Welcome & introduction The challenges of vulnerability management
  • Norms and standards ISO 27001 / 27002, NIST SP 800-40, CIS Benchmarks
  • Vulnerability management cycle identification, analysis, remediation, monitoring
  • Lunch break
  • Overview of tools Nessus, OpenVAS, Qualys, Tenable, Rapid7
  • Practical workshop Design a management process based on ISO & NIST
  • Guided case study detection, analysis and response simulation
  • Conclusion best practice, pitfalls to avoid, action plan

Assessment procedures

  • MCQs at the end of the day on key concepts (standards, cycle, best practice). 
  • Assessment of the deliverables produced as part of the case studies. 

Teaching methods

  • Training led by a certified cyber security expert (ISO 27001 Lead Implementer / CEH...). 
  • Alternating theoretical presentations, tool demonstrations and practical workshops. 
  • Digital course material, process model provided, maturity assessment grid. 

Training objectives

At the end of the course, participants will be able to : 

  • Design a complete vulnerability management process that complies with ISO 27001, ISO 27002 and NIST guides. 
  • Map assets at risk and integrate scan results into a processing cycle. 
  • Choosing the right detection, assessment and remediation tools. 
  • Set up a structured reporting system and communicate effectively with management. 
  • Assess the maturity of their approach and build a continuous improvement plan. 

Training prerequisites

  • Basic knowledge of IT infrastructure and information systems security. 
  • No prior certification required. 

Tarif

2440 €
Book Now

Important information:

Our courses are not registered with the Répertoire National des Certifications Professionnelles (RNCP), but they do comply with the requirements of the Répertoire Spécifique (RS).

Réserver l’événement

icône Form/calendar icon
icône Form/ticket icon
1 personne
2440 €
icône Form/up small icon icône Form/down small icon
Billets disponibles: Illimité
Le billet de "1 personne" est épuisé. Vous pouvez essayer un autre billet ou une autre date.

We use cookies to improve your experience. See our Cookie policy and our Privacy policy.

Information request

I would like more information about your training courses

ACG Cyberacademy collects and uses the data provided via this form in order to process your registration requests. Fields marked with an * are required. The other information enables us to optimise the follow-up of your request and the quality of our customer relations.