Watch individual videos to learn specific skills and techniques with Qualys.

Asset Inventory & IT Security:

Cloud and Container Security:

Web Application Security:

Compliance:

Get certified with in-person or inline instructor-led training. All courses include hands-on labs and certifications. Already registered? Go straight to the Qualys Training & Certification System

Container Security

Agenda

  1. Container Security Overview

  2. Install Docker

  3. Install Container Security Sensor

  4. Assess Container Applications

  5. Patchable Vulnerabilities

  6. Container Security Key Uses

Hands-On Labs

  1. Account Activation and Setup

  2. Install Container Sensor

  3. A Simple Container Application

Vulnerability Management

Agenda

  1. Host Assets

  2. The KnowledgeBase

  3. KnowledgeBase Search List

  4. Vulnerability Scanning

  5. Assets and Asset Management

  6. Reporting

  7. User Management

  8. Remediation

Hands-On Labs

  1. Account Setup

  2. KnowledgeBase Search List

  3. Vulnerability Scanning

  4. Assets

  5. Reporting

  6. User Management

  7. Remediation

PCI Compliance

Agenda

  1. PCI DSS basics

  2. PCI scope

  3. Qualys coverage

  4. PCI Compliance Application

  5. PCI Compliance scanning

  6. PCI Compliance with Vulnerability Management

  7. Compliance reporting

  8. Web application scanning

  9. Self-assessment Questionnaire

  10. Policy Compliance

Hands-On Labs

  1. Account Activation and Setup

  2. PCI Scanning

  3. PCI Compliance Reports

  4. Security Assessment Questionnaire

  5. Policy Compliance PCI-DSS Policy

  6. PCI mandate Report

Advanced Reporting

Agenda

  1. Reporting Introduction and Overview

  2. Scan Data

  3. Agent Data

  4. Authentication Report

  5. Scan Report Template Findings

  6. Scan Based Findings

  7. Host Based Findings

  8. Hosts with Cloud Agents

  9. Scan Report Template Display

  10. Scan Report Template Filter

  11. Services and Ports

  12. Distributing Reports

  13. Assigning Assets to Users

  14. Assigning Users to Templates

  15. Distributing Scheduled Reports

  16. Scorecard Reports

  17. Patch Report Template

  18. Reporting Use Case - Major Vulnerability Release

Hands-On Labs

  1. Account Activation and Setup

  2. Authentication Report

  3. Scan Report Template - Findings Options

  4. Scan Report Template - Display Options

  5. Scan Report Template - Filter Options

  6. Report Scheduling and Distribution

  7. Patch Report Template

  8. Addressing New or Urgent Vulnerabilities

Advanced Scanning

Agenda

  1. Host Assets

  2. Scan Process

  3. Authenticated Scanning

  4. Secure Windows Authentication

  5. Secure Unix Authentication

  6. Agentless Tracking

  7. Scanner Appliance Deployment Strategies

  8. Virtual Scanner Appliance

  9. VLANs

  10. Static Routes

  11. Scanning through Firewalls

  12. Segmentation Strategies

  13. Scanner Parallelization

  14. Qualys Scan Performance

  15. Continuous Scanning

  16. Monitoring Scan Time

  17. "Additional" Scanning Options

  18. Scanning Cloud Agent Hosts

  19. Delegating Scanning Tasks and Privileges

Hands-On Labs

  1. Account Activation and Setup

  2. Authentication and Host Tracking

  3. Analyzing Scan Results

  4. Managing Scan Performance

  5. "Additional" Scanning Options

  6. Scanning Cloud Agents

  7. Scan Delegation

Policy Compliance

Agenda

  1. Policy Compliance Overview

  2. Application and Account Setup

  3. Control Library & User Defined Controls (UDC)

  4. Compliance Scanning

  5. Policies

  6. Reporting

  7. Security Assessment Questionnaire

Hands-On Labs

  1. Account Setup

  2. Create User Defined Controls

  3. Compliance Scanning

  4. Create Policy

  5. Compliance Reports

  6. Security Assessment Questionnaire

AssetView and Threat Protection

Agenda

  1. Introduction

  2. Data Sources

  3. Asset Groups

  4. Asset Tagging

  5. Asset Search

  6. How to search

  7. Demo: Widgets and Dashboards

  8. Introduction to Threat Protection

  9. Using RTI's with VM and CM

Hands-On Labs

  1. Account Setup

  2. Launch a scan

  3. Asset Tagging

  4. AssetView Queries

  5. AssetView Widgets and Dashboards

  6. Threat Protection

  7. Using RTI's with VM and CM

Web Application Scanning

Agenda

  1. Web Application Scanning Overview

  2. KnowledgeBase and Search Lists

  3. Basic Application Setup and Discovery

  4. Crawl Scope

  5. Scanning

  6. Discovery Scan

  7. Advanced Application Setup and Scanning

  8. Web Application Testing

  9. Reporting

  10. Tags and Users

  11. 3rd Party Integration

  12. Malware Detection

Hands-On Labs

  1. Account Setup and WAS Overview

  2. Basic Web Application Setup and Discovery

  3. Advanced Web Application Setup and Scanning

  4. Web Application Reporting

  5. Tagging

  6. User Creation and Scope

  7. Burp Integration

Cloud Agent

Agenda

  1. Overview

  2. Installation and Deployment

  3. Lifecycle and Configuration

  4. Cloud Agent and VM

  5. Scanning Cloud Agent Hosts

  6. Cloud Agent and PC

  7. Cloud Agent and FIM

  8. Cloud Agent and IOC

Hands-On Labs

  1. Account Setup and CA installation

  2. Cloud Agent Deployment

  3. CA Configuration and Tuning

  4. Cloud Agent and VM

  5. Cloud Agent and PC

  6. CA and AssetView

  7. FIM Monitoring Profile