Aperçu Prochaine formation

Durée 2 journées
Temps de 09h00 - 12h00 & 13h00 - 17h00

Nos formateurs pour la formation: CISO M5: Threat & Vulnerability Management





Module 5 Threat & Vulnerability management - presentation video

How do you manage threat & vulnerability? Our teacher for this module, Tom Van den Eynde will enlighten you on all the aspects of this course module. 

Cette formation est donnée en anglais.

Continuous assessment of threats and vulnerabilities is a common practice in a security programme. As a CISO, you will set up, manage and measure the threat and vulnerability process. In this module, we will explain the basics of the threat and vulnerability management.

We start with the common ways how security events are identified and logged. Tools such as SIEM (Security Incident and Event Management) will help you to capture and correlate logs. SOC (Security Operating Center) is used to monitor alle the events and correlations, in order to be able to respond as soon as new events are detected. We will discuss frameworks such as MITRE Att&ck, a knowledge base and model that reflects the various phases of an attack lifecycle. It documents attacker tactics and techniques based on real-world observations.

During this module, we will discuss different types of hacking. To start with, we will learn you the in and outs of white board hacking (aka Threat Modelling). Next, you will learn how Penetration Testing by ethical hackers fits into the threat and vulnerability management programme. We will discuss what kinds of penetration tests you can set up, such as blue, red and purple teams. We will also discuss the insider threat, as employees sometimes are the first « hackers » you will be confronted with.

In the last section of this course we will focus on vulnerability and patch management. In order to prevent you from threats, the management of vulnerabilities is crucial. A well defined and properly managed management of vulnerabilities increases your security resilience.

Why take this course?

  • Learn your role as a CISO in threat and vulnerability management
  • Understand the concepts of SIEM and SOC to monitor threats
  • Know the role of hacking in your security program
  • Be successful in the management of vulnerabilities and patches


This course is also the sixth module in a unique programme intended to lead to formal CISO certification. To check out the other modules, download this file: CISO BROCHURE DOWNLOAD

Target group

Who is the Certified CISO programme’s ‘Threat and vulnerability management’’ module intended for? This module targets information and cybersecurity officers, managers and other security professionals tasked with crafting a companywide information security upgrade strategy. Those working in risk management and/or conducting security-related audits could also benefit from this course.

Learning goals

Your role as a CISO in:

  • SIEM and SOC management
  • MITRE Att&ck and other frameworks
  • Threat Modeling and intelligence gathering
  • Penetration Testing & Red Teaming Strategy
  • Vulnerability & patch management
  • Insider Risk Management
  • Security Incident Management

Educational approach of this course

When it comes to establishing and running a proper Security Governance Programme, there are a variety of approaches. A one-size-fits-all formula doesn’t apply.

And it’s for that reason that this course has a two-fold objective. It aims to introduce you to the current standards and frameworks available and to supply you with the practical skills required to apply them correctly within your organisation.

To accomplish this, we’ve lined up highly skilled professionals who have been in the trenches for years. They share practical advice and workarounds and teach you the core of what you need to know. The course itself blends theoretical models, frameworks, and standards to give you an overview of what’s out there, combined with practical exercises for applying what you’ve learnt in real-life situations.

End product

You’ll be awarded a certificate of completion at the end of the course. This module does not entail any exams or official certification.

Note:   Have you got plans to pursue the entire ‘Certified CISO’ programme? In that case, you’ll need a certificate of completion for all modules, and they must have been obtained within the past two years. The first six modules must be completed to start the 7th and final module, the ‘Master Project’, where you will apply the content of the previous modules to a single integrated project. Once finished, and if you obtain a positive evaluation, you’ll be awarded the ‘Certified CISO’ certificate.

Your bonus training package includes:

  • Training material (printed and PDF format): handouts of the presentations with notes
  • A list of useful links with additional information on standards and frameworks discussed during class
  • The exercises and their solutions (where applicable)

How to prepare yourself

This is a classroom-based, non-technical course. Bring something along (e.g., a laptop, notebook, tablet) to take additional notes.

Course prerequisites:

  • A basic understanding of IT
  • Some experience in a corporate environment as a manager could be beneficial but is not essential.


Get updates on this training? 

Would you like to be kept up to date on CISO trainings?
Subscribe below.


Day 1

09h00 - 17h00

1| Security Operations Center

  • Principles and technologies to manage security incidents (SIEM)
  • Monitor threats (SOC)
  • Resource management when managing security operations

2| MITRE Att&ck and other frameworks

  • What is MITRE ATT&CK?
  • How to put MITRE ATT&CK into use?
  • Learn about other frameworks for advisory tactics and techniques

3| Threat Modeling and intelligence gathering

  • What is Threat modeling (TM) aka white board hacking?
  • How do you execute a TM workshop?
  • What is the outcome of TM and how to manage the results?
  • How can intelligence gathering help you to identify new threats?

Day 2

1| Penetration Testing & Red Teaming Strategy

  • How penetration testing helps you to test your security posture?
  • Types of pentesting programs
  • How to manage the output of a pentest?
  • Contractual and legal aspects of pentesting
  • What are blue, red, and purple teams?

2| Vulnerability & patch management

  • What is vulnerability management
  • How to react on 0-day exploits?
  • Updates and versioning control
  • Patch management and roll out schemes

3| Insider Risk Management

  • What is the insider risk and how to manage it?
  • Common types of user errors
  • Incident reporting by end users
  • How to build an awareness programme?

4| Security Incident Management

  • Type of incidents
  • Incident categorization
  • Organization of the incident handling
  • How to prepare incident handling
  • Effectively manage security incident response
  • Incident reporting



Hors TVA


"CISO Certificate of Completion"

Ce prix comprend le lunch, le café, les rafraîchissements et le matériel de cours.

KMO-Portefeuille Flandre - intervention élevée pour le thème CYBERSECURITY : 45 % pour les petites et 35 % pour les moyennes entreprises.

S'inscrire maintenant

Réserver un appel

Schedule 2023






CISO M5: Threat & Vulnerability Management

23 march jusqu'a 24 march 2023


CISO M5: Threat & Vulnerability Management

24 october jusqu'a 25 october 2023


CISO M5: Threat & Vulnerability Management

21 march jusqu'a 22 march 2024


CISO M5: Threat & Vulnerability Management

23 october jusqu'a 24 october 2024


Économisez sur vos études:

  • Registration number KMO portefeuille: DV.O213013

    Our courses are accredited for the KMO-portefeuille. This means that, depending on whether you are a small or medium-sized enterprise, you can receive a 45% or 35% subsidy from the Flemish Government on the cost of registration.

  • Acknowledgement by Chèque-Formation

    The training voucher allows you to benefit from financial aid to train your workers in one of the approved training centres. Worth 30 euros, it corresponds to 1 hour of training per worker.


Restez informé grâce à notre newsletter

Restez au courant de nos dernières nouvelles, offres et formations disponibles.