Back to qualys.com

Free training and certification

Vulnerability Management

Learn the core features of Qualys Vulnerability Management as well as best practices to effectively build a VM program for your organization. This is the first course in the VM Learning Path.

For the best experience, Qualys recommends the certified Vulnerability Management course: self-paced or instructor-led.

To learn the individual topics in this course, watch the videos below.

Videos

Introduction Qualys Vulnerability Management November 20, 2017 Start here: Get introduced to the Vulnerability Management lifecycle and the key features and operation of Qualys Vulnerability Management....
Host Assets November 20, 2017 This video describes the steps to activate your trial account, and then the steps to add and remove host assets to and from your...
The Qualys KnowledgeBase November 21, 2017 Learn about the Qualys KnowledgeBase. This video covers: - Vulnerabilities - QIDs - Title, Severity, Categories, CVE ID, Vendor Reference...
Search Lists November 20, 2017 This video is about Search Lists and their use cases inside Qualys Vulnerability Management. This video covers: - What is a Search List? -...
Extended Scanning November 21, 2017 This video is about Scanning. This video covers: - Vulnerability Management Lifecycle - Host Discovery, Port Scanning, Service...
Introduction to Assets November 20, 2017 This video provides an overview for identifying and using different asset management tools and services. This video covers: - VM...
Asset Groups November 21, 2017 This video identifies the different components and use cases of an Asset Group. This video covers: - The steps for creating and modifying...
Asset Tags November 20, 2017 This video describes the steps for creating Asset Tags for the purpose of organizing host assets in your Qualys subscription. This video...
Reporting November 21, 2017 This video covers Reporting. This video covers: - Vulnerability Management Lifecycle - Scan Report Templates - Patch Report Templates -...
Disabling and Ignoring Vulnerabilities March 16, 2018 This video is on how to ignore and disable vulnerabilities in Qualys Vulnerability Management. Things covered in this video: - Disable...
User Management November 21, 2017 This video will describe the different Qualys user roles, and provide steps to create and modify user accounts. This video covers: - User...
Vulnerability Remediation November 21, 2017 This video will describe the basic components of a Remediation Policy. This video covers: - Policy Creation - Ticket assignment - Ignore a...
Extended Mapping November 21, 2017 This video is about the Mapping. This video covers: - Configuring Maps - Map Targets - Vulnerability Management Lifecycle - Mapping steps...