2020 Live Online Training
Vulnerability Management

October 14—15, 2020 | 1:00 PM - 4:00 PM ET
Web Conference

This introductory course covers the process of interpreting scan results, prioritizing results by integrating open source intelligence, and creating a remediation plan. Note that due to time constraints, we will be not be performing scanning of network assets, but interpreting results instead. This course is about more than reading a Nessus scan report. Mature vulnerability management teams work with IT to prioritize remediation of vulnerabilities by examining a number of factors, including potential mitigations, complexity of patching, whether a vulnerability is in the wild, etc. In this two-day training, IANS Faculty member Jake Williams will cover those factors and strategies organizations can use to prioritize vulnerability remediation.

Target Audience

Personnel that want to understand how to implement a vulnerability management program, including Semi-technical Managers, Blue Team Operators, Systems Administrators, and SOC Analysts.

Prerequisite Knowledge

A working understanding of vulnerability terminology (e.g. risk, threat, vulnerability, exploit, etc.) will be helpful in maximizing student outcomes.


Let your colleagues know you're coming!

Register Now

* Required Fields
*Receive 1 CPE credit for every hour of attendance at our events.

2020 Live Online Training Facilitators


Jake Williams

IANS Faculty
Jake Williams, the founder of Rendition Infosec, has almost two decades of experience in secure network design, penetration testing, incident response, forensics and malware reverse engineering. Prior to founding Rendition Infosec, Williams worked with various government agencies in information security and CNO roles. He also works with SANS where he teaches and authors courses in Malware Reverse Engineering, Memory Forensics, Cyber Threat Intelligence, and Advanced Exploit Development. He is the two-time victor of the annual DC3 Forensics Challenge. He has spoken at Blackhat, DEFCON, Shmoocon, CEIC, RSA, EnFuse, and DC3 Conference (among others). His research areas include automating incident response throughout the enterprise, threat modeling and analysis, binary analysis, and malware C2. The primary focus of his work is increasing enterprise security by presenting complex topics in a way that anyone can understand.

Web Conference

Registrants will receive a logistics email with web conference meeting information one day prior to the event.

Coming Soon

More Information Coming Soon

Attendee Contact


Check out IANS other upcoming events