Qualys, Inc. is a pioneer and leading provider of cloud-based security and compliance solutions. Qualys helps organizations streamline and consolidate their security and compliance solutions in a single platform and build security into digital transformation initiatives for greater agility, better business outcomes, and substantial cost savings.
The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously, enabling them to automate the full spectrum of auditing, compliance, and protection for IT systems and web applications on premises, on endpoints and elastic clouds. For more information about Qualys, please visit www.qualys.com.
Students and alumni can sign-up using their @nyu.edu email address.
For help setting up an account, view this tutorial.
Vulnerability Management Badge
Qualys provides students and alumni with the opportunity to complete its Vulnerability Management E-Course and Cloud Agent E-Course. In these courses, they will learn to use the Qualys Vulnerability Management Solution to detect and protect against attacks.
With these labs, students and alumni get hands-on experience to take back to their daily work with vulnerability management. They will also be introduced to the transferable framework, the vulnerability management life cycle, which they can apply no matter what vulnerability management tool their company utilizes.
At the completion of these labs, badge earners will:
- Practice and master the vulnerability management life cycle.
- Learn best practices for agent-based and scanner-based vulnerability analyses.
- Develop knowledge base & search lists
- Apply vulnerability assessment
- Manage asset inventory
- Implement threat protection
- Implement threat remediation
- Utilize Cloud Agent Lifecycle and Configuration
To earn the Vulnerability Management Badge:
- Complete Vulnerability Management E-Course
- Complete Cloud Agent E-Course
Approximate time to Complete Badge: 14 Hours
Recommend Prerequisite Experience: Basic understanding of Windows/Linux and the vulnerability management life cycle.