Mitigation & Remediation Mitigation & Remediation Organizations known for successful vulnerability management have proactively created both mitigation and remediation plans to handle threats and vulnerabilities when they arise. While it is cost-prohibitive to … Read more NOW “Mitigation & Remediation”
Course Summary Congratulations!You have completed this course. You are now able to: Determine the steps to remediate risk as related to security vulnerabilities and policy violations.Identify the steps to choose better … Read more NOW “Course Summary”
Lesson 4 – Copy By the end of this lesson, you will be able to: Objective Statement OneObjective Statement TwoObjective Statement ThreeAdd / Remove as needed <Heading Title> Content for heading … Read more NOW “Lesson 4 – Copy”
Lesson 2 Summary Lesson 2 Summary Congratulations, you’ve completed Lesson 2! Now you are able to identify the appropriate path to remediation: Upgrade to a non-vulnerable version of the same component.Migrate to … Read more NOW “Lesson 2 Summary”
Remediation Workflows Objectives By the end this lesson, you will be able to: Articulate the importance of the best possible open-source components.Identify the difference between Policy and Security violations.Detect when a … Read more NOW “Remediation Workflows”
Fixing Violations Objectives By the end of this lesson, you will be able to identify the appropriate path to remediation: Upgrade to a non-vulnerable version of the same component.Migrate to a … Read more NOW “Fixing Violations”
Welcome to Component Remediation This course will help you identify various workflows to remediate vulnerable components in your applications as identified by Nexus Lifecycle. Questions for Reflection Consider the following questions. There are no … Read more NOW “Welcome to Component Remediation”