back to top

UC – Vulnerability Management

All Roads Lead to VulnMan! Eric Johnson is passionate about Vulnerability Management and for good reason. VulnMan is the crucial operation within a comprehensive cybersecurity strategy that aims at discovering, evaluating, and eliminating vulnerabilities, wherever they can be found! As a result, organizations can then minimize their cyberattack exposure and enhance their security posture with proper VulnMan. The following UC covers the end-to-end basics when developing such a program.

As Eric says, “VulnMan is the linchpin in your cybersecurity program AND, dare I say, the entire organization!” Find out why.

Price = FREE!

Whatโ€™s an Upskill Challenge (UC)?

A UC is a CTF-style, bite-sized lesson from the JHT Team, our courseware developers as well as โ€œfriendsโ€ of JHT. They are meant to be short and to the point. UCs focus on a single tool or concept and are helpful in quickly providing useful skills that might be prerequisites for other types of educational content on the platform.

A UC should be 10 โ€“ 30 minutes of student time and have no VMs. There are quizzes to make sure that the content is understood.

Prerequisites for UC – Vulnerability Management

UCs assume no knowledge at all! Theyโ€™re meant to be completely self-contained, so all of the answers are in the lesson. No outside research is required.


WMD 6 Not Quite Ready

Our delay is your benefit! Discounts still in effect until WMD 6 is released. No Coupon Code Required!

- WMD 1 = NameYourPrice Only $40
-ย 
WMD Intro Path (Courses 1-3) = 46% Off


Recent Releases

- WMD 5, SIEMless Threat Hunting
- 2 New Bundles 50% Off 7 CTFs, 75% Off 7 HALs
- Blogs: Brief History of ConDef Ecosystem,ย  ConDef MCP โ€“ Meet Your AI Teaching Asst, Blue Team Training Roadmap
- Free Upskill Challenges: Home Lab, Nmap, PowerShell


Top Picks

- The Mishaal Bundle
- API Hacking by Katie Paxton-Fear
- MADS - Mastering AD Security Vols 1 - 3 by Slavi Parpulev


Courses In Production

WMD 6, WebApp Pentest, Network Pentest, Deception, OS Hardening, Hardware Hacking 101, Dark Web 2...