Hard to believe you don't have more views. I've seen quite a few instructional videos in my days. You are a true lecturer with some deep knowledge. One thank for many videos watched.
This video was great. Very well organized and explained - ending with a summary of what was covered! Thanks! I do have 1 question that wasn’t covered - and that is “Why do CVE’s still contains CVSS scoring for both v2.0 and v3.0 instead of simply displaying the newer v3.0 score…?”
it all depends how the enumeration process works for a specific security product. There are three different authority who are involved here, application vendor, security solution provider and the governing authority listing CVE. Since once the CVE is published, there is no ground work done to go back and revise the score. So, to make sure everything stays connected, still the score is been derived from both the models.
I am very much liking your content and the presentation you provide , very well organized and full of knowledge . I am looking for a carrier in Vulnerability Management , could you please guide and help me with the right approach . Thanks !
Hard to believe you don't have more views. I've seen quite a few instructional videos in my days. You are a true lecturer with some deep knowledge. One thank for many videos watched.
Thanks for helping to wrap my head around the concept of CVSS. Great instructions.
Great overview of CVSS - easy to follow and understand. Thank you!
Thanks for the wonderfully informative and clearly explained video. waiting for more Cybersecurity Stuff
More to come!
This video was great. Very well organized and explained - ending with a summary of what was covered! Thanks!
I do have 1 question that wasn’t covered - and that is “Why do CVE’s still contains CVSS scoring for both v2.0 and v3.0 instead of simply displaying the newer v3.0 score…?”
it all depends how the enumeration process works for a specific security product.
There are three different authority who are involved here, application vendor, security solution provider and the governing authority listing CVE. Since once the CVE is published, there is no ground work done to go back and revise the score.
So, to make sure everything stays connected, still the score is been derived from both the models.
Very clear and helpful explanation, thank you!
I am very much liking your content and the presentation you provide , very well organized and full of knowledge . I am looking for a carrier in Vulnerability Management , could you please guide and help me with the right approach . Thanks !
I would suggest to start with understanding different frameworks and then move gradually to advanced workloads.
can we continue this🥺 series please
Soo.. how to use it? Any irl example?