This is some text inside of a div block.

Strategies for Managing Vulnerabilities and Mitigating Cyber Risks

6 items of learning content
|
9h 43m of content
English

Pathway Summary

Managing vulnerabilities in your computing infrastructure is a critical success factor for blocking cyberattacks. In this learning path, discover how to find, prioritize, and fix vulnerabilities, as well as allocate your limited budget to manage seemingly unlimited cyber risks.

Set a productive cadence for finding vulnerabilities.
Automate your work with a vulnerability scanner.
Assess the risk of a vulnerability and select a resolution.

Browse All Pathway Courses

Here’s a list of all the courses that are part of this learning pathway. Not interested in completing the entire pathway? You can click on the links to get started on individual courses.
August 11 - September 30, 2025

Want to win cash for skilling?

Join the free AI Skill-A-Thon challenge - compete to win cash prizes! Learn how to apply AI skills to your work to boost your productivity. See each competition page for more details.
Note: Only courses started and completed between August 11, 2025 - September 30, 2025 count towards the AI Skill-A-Thon.

Relevant Pathways