0% found this document useful (0 votes)
104 views11 pages

Vulnerability Management

Vulnerability Management
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
104 views11 pages

Vulnerability Management

Vulnerability Management
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11

SOC Analyst (Cyber Security)

Batch-1

MIRCHI TRAININGS
Organizer : Sidhu
Cyber Security Expert
9+ Years of Industry Experience
[email protected]
www.cyberauth.in

www. mirchi.trainings@cyberau
cyberauth.in th.in
INDEX – Security Analyst
1. Introduction
2. General Architecture of Corporate Network
3. Basics of Networking
4. Basics of Network & Endpoint Security
5. Cyber Security
6. Email Security
7. Basics of SIEM
8. Basics of Vulnerability Management
9. Basics of Malware Analysis
10. Basics of Threat Hunting
11. Discussion on Cyber Security Use cases (10-15).
12. Discussions on top security attacks.
13. Interview Preparation / Personality Development.
14. Top 100 interview Q & A’s
15. Mock Interviews.

www. mirchi.trainings@cyberau
cyberauth.in th.in
SOC Analyst (Cyber Security)
Batch-1
Agenda:
• Vulnerability Management

www. mirchi.trainings@cyberau
cyberauth.in th.in
Vulnerability Management

• What is Vulnerability ?
• A Vulnerability is a weakness in a system, network or any
application.
• System: Running with older version of a software
• Network: Use of unsecure protocols.
• Application: No user input validation (Leads to injection attacks)

www. mirchi.trainings@cyberau
cyberauth.in th.in
What is Threat?

• Anything / Anyone that can exploit a vulnerability,


intentionally or accidentally is a Threat.
• Example: An Attacker, Earthquake on untrained staff.

www. mirchi.trainings@cyberau
cyberauth.in th.in
What is Risk ?

• The potential for loss, damage or destruction of an asset a


result of threat exploiting a vulnerability.
• Example: Financial loss because of e-commerce server is
down, loss of reputation etc.

www. mirchi.trainings@cyberau
cyberauth.in th.in
What is exploit ?

• A tool used to take advantage of the vulnerability.


• Example: Eternal blue (Take advantage of SMB
vulnerability).

www. mirchi.trainings@cyberau
cyberauth.in th.in
What is Vulnerability Assessment ?

• Vulnerability Assessment is the process of defining, identifying,


classifying and prioritizing vulnerabilities in computer system,
applications and Network infrastructures.
• Vulnerability Assessment team closely works with other
infrastructure teams to help them remediate/patch
vulnerabilities with the systems they manage.

www. mirchi.trainings@cyberau
cyberauth.in th.in
Vulnerability Management Life Cycle
 Discover : Discover all the assets (using an host discovery scan)

 Prioritize Assets: Prioritize the assets based on the criticality and


risk.

 Assess : Perform vulnerability Assessment to identify vulnerabilities.

 Report: Report all the vulnerabilities, based on criticality and


business risk.

 Remediate: Remediate the vulnerabilities by applying patches or


modifying the configurations.

 Verify: Confirm that the patch has been applied successfully by


rescanning the machines.
Major VA Tools
 Tenable Nessus

 Qualys Guard

 Rapid7 Nexpose

 OpenVAS (Open Vulnerability Scanner) –


Open Source tool.
Y O U
A N K
TH

www. mirchi.trainings@cyberau
cyberauth.in th.in

You might also like