Back to qualys.com

Training library

Vulnerability Management

Learn the core features of Qualys Vulnerability Management as well as best practices to effectively build a VM program for your organization.

Videos

Host Assets February 15, 2019 This video describes the steps to activate your trial account, and then the steps to add and remove host assets to and from your...
The Qualys KnowledgeBase February 15, 2019 Learn about the Qualys KnowledgeBase. This video covers: - Vulnerabilities - QIDs - Title, Severity, Categories, CVE ID, Vendor Reference...
Search Lists February 15, 2019 This video is about Search Lists and their use cases inside Qualys Vulnerability Management. This video covers: - What is a Search List? -...
Extended Scanning February 15, 2019 This video is about Scanning. This video covers: - Vulnerability Management Lifecycle - Host Discovery, Port Scanning, Service...
Introduction to Assets February 15, 2019 This video provides an overview for identifying and using different asset management tools and services. This video covers: - VM...
Asset Groups February 15, 2019 This video identifies the different components and use cases of an Asset Group. This video covers: - The steps for creating and modifying...
Asset Tags February 15, 2019 This video describes the steps for creating Asset Tags for the purpose of organizing host assets in your Qualys subscription. This video...
Reporting February 15, 2019 This video covers Reporting. This video covers: - Vulnerability Management Lifecycle - Scan Report Templates - Patch Report Templates -...
Disabling and Ignoring Vulnerabilities February 15, 2019 This video is on how to ignore and disable vulnerabilities in Qualys Vulnerability Management. Things covered in this video: - Disable...
User Management February 15, 2019 This video will describe the different Qualys user roles, and provide steps to create and modify user accounts. This video covers: - User...
Vulnerability Remediation February 15, 2019 This video will describe the basic components of a Remediation Policy. This video covers: - Policy Creation - Ticket assignment - Ignore a...
Extended Mapping February 15, 2019 This video is about the Mapping. This video covers: - Configuring Maps - Map Targets - Vulnerability Management Lifecycle - Mapping steps...
Introduction Qualys Vulnerability Management February 15, 2019 Start here: Get introduced to the Vulnerability Management lifecycle and the key features and operation of Qualys Vulnerability Management....