RSA Archer IT Security Vulnerabilities Program (ITSVP) Overview

Document created by Joseph Cantor Employee on Mar 18, 2019Last modified by Joseph Cantor Employee on Nov 6, 2019
Version 8Show Document
  • View in full screen mode

On-Demand Lab Details

Register

 

 

In order to register for a class, you need to first

create a Dell Education account If you need further assistance, contact us

 

Summary

Are you an RSA Archer customer looking for information on the vulnerabilities program use case? This On-Demand Lab will provide you with everything you need to know to get started with RSA Archer ITSVP.

 

Overview

This course is considered an introduction to the recently revamped RSA Archer IT Security Vulnerability Program use case. Apart from digging into the architecture of the use case, this course allows students to have hands on experience working on the following (but not limited to):

  • Exploring out-of-the-box integrations with external scanners
  • Effectively managing the entire vulnerability lifecycle from detection to reporting through remediation and verification
  • Managing bulk schedules

 

Lab exercises provide students with the ability to practice what they have learned. To maximize the value of your learning experience, this course also includes access to RSA University’s virtual environment.

 

Audience

Anyone interested in the vulnerability management program that RSA Archer offers.

 

Delivery Type

On-Demand Lab

 

Duration

Estimated time to complete is 2 hours. Exact time required to complete all lab exercises will vary based on the existing Archer experience level of each learner.

 

Prerequisite Knowledge/Skills

Prior to attending this class, students are encouraged to have completed the following courses:

  • RSA Archer Administration I
  • RSA Archer Administration II

 

Course Objectives

Upon successful completion of this on-demand lab, participants should be able to:

  • Understand how RSA Archer uses ITSVP to identify and prioritize high risk threats.
  • Understand what needs to be in place for ITSVP to work.
  • Implement an end-to-end process to address vulnerabilities from detection to remediation.
  • Understand out-of-the-box third party integrations with Qualys & Tenable.
  • Determine the use of each dashboard.
  • Set up bulk schedules.

 

Course Outline

  • Module 1: Introduction to ITSVP
  • Module 2: ITSVP Overview
  • Module 3: ITSVP Architecture
  • Module 4: ITSVP Integrations and Dashboards

 

 

 

 

On-Demand Lab Details

Register

 

 

In order to register for a class, you need to first

create a Dell Education account If you need further assistance, contact us

Attachments

    Outcomes