Free Training |

Vulnerability Management

All video libraries

Learn the core features of Qualys Vulnerability Management as well as best practices to effectively build a VM program for your organization. This is the first course in the VM Learning Path.

For the best experience, Qualys recommends the certified Vulnerability Management course: self-paced or instructor-led.

To learn the individual topics in this course, watch the videos below.

Vulnerability Management

02:34
Vulnerability Management Get started here to view the Vulnerability Management course agenda and learn how to acquire course training material and your student trial...

VM Lifecycle and Cloud Platform Overview

05:16
VM Lifecycle and Cloud Platform Overview Learn about the six phases of the Vulnerability Management lifecycle and discover the different components of the Qualys Cloud Platform you...

VM Account Setup

04:16
VM Account Setup Learn how to activate your student trial account and navigate around the Qualys UI. Add host assets to your subscription and launch an...

Qualys KnowledgeBase

09:32
Qualys KnowledgeBase Take a tour of the Qualys KnowledgeBase and discover the industry leading vulnerability data and information it contains. Understand the...

KnowledgeBase Search List

06:14
KnowledgeBase Search List Learn how to create a custom list of QIDs from the Qualys KnowledgeBase and understand the behaviors and characteristics of both Static and...

Vulnerability Assessment

01:13
Vulnerability Assessment Get a quick overview of the technologies used in Qualys VM to perform vulnerability assessments.

Vulnerability Scanning

06:41
Vulnerability Scanning Discover the modules and processes used by the Qualys VM scanning engine to perform vulnerability assessments.

Scan Configuration - Launching A Scan

09:28
Scan Configuration - Launching A Scan Uncover the various configuration components required to launch a scan and see how they are used to launch a vulnerability assessment scan.

View Scan Results

03:19
View Scan Results Learn how to view and understand the results of vulnerability assessment scans and discern the various components of the raw scan report.

Scheduling Assessment Scans

02:53
Scheduling Assessment Scans Learn how to keep up with new vulnerabilities by scheduling regular or frequent vulnerability assessment scans and discover the various...

Assets and Asset Inventory

10:27
Assets and Asset Inventory Uncover the various tools and features within Qualys Vulnerability Management and AssetView that allow you to view, manage, and organize host...

Asset Groups

04:23
Asset Groups Learn how to create and use Asset Groups to manage host assets in your subscription.

Using Asset Groups

03:53
Using Asset Groups See how Asset Groups are used as scanning and reporting targets, as well as using Asset Groups to assign host access privileges to Qualys users.

Scan by Hostname

02:40
Scan by Hostname Learn how to use Asset Groups to launch scans that target hostnames rather than IPs.

Asset Tags

04:58
Asset Tags Learn how to create and use Asset Tags to manage host assets in your subscription.

Using Asset Tags

03:34
Using Asset Tags See how Asset Tags are used to complete scanning and reporting tasks.

AssetView Connectors

03:30
AssetView Connectors Uncover the various data sources used by Qualys AssetView and see how “Connectors” can be used to add assets (hosted by cloud providers) to...

Reporting Overview

05:49
Reporting Overview Take a quick tour of the different report types available within the Qualys Vulnerability Management application.

Report Templates

08:30
Report Templates Learn how to create and use report templates and discover the different source, filter and display options within a template.

Threat Protection

05:53
Threat Protection Examine the impact of adding Real-Time Threat Indicators to your existing vulnerability data and findings, through the Qualys Threat...

User Management

07:28
User Management Discover the different Qualys account user roles and learn how to create and edit user accounts and work with Business Units.

Remediation

04:14
Remediation Identify the basic components of a Remediation Policy and see how policies can be used to assign detected vulnerabilities to specific Qualys...

Extended Mapping

13:29
Extended Mapping This video is about the Mapping. This video covers: - Configuring Maps - Map Targets - Vulnerability Management Lifecycle - Mapping steps...