Vulnerability walkthrough

Updated -

Vulnerability walkthrough videos

Jeremy West, from Product Security, hosts a series of video sessions covering key vulnerability scanning information.

Session 1: Understanding how vulnerability scanners work

This video focuses on vulnerability scanners, how they operate, and the objectives scanning vendors pursue in developing these tools.

Session 2: Understanding the data used in vulnerability scanning

Several Red Hat's Product Security team members discuss the various data used in vulnerability, discrepancies, definitions, and delivery formats that Red Hat uses to disclose vulnerability data.

Session 3: Vulnerability Scanning: How to read and interpret scan data

In this video, we discuss a common approach to reviewing the results of a vulnerability scan, how to interpret those results, and how to generate an action plan.

Session 4: How to assess findings and remediate or mitigate risks

Our last video in the vulnerability scanning walkthrough discusses tactics and scenarios used in either remediating or mitigating vulnerabilities.

Comments