Certification Program

With the help of Holm Security's Certification Program, you will gain all the knowledge and skills needed to implement a comprehensive vulnerability management strategy to stay one step ahead of cybercriminals. Completion of certification demonstrates a deep understanding of vulnerability management in general and expertise in Holm Security's platform, including product and technical knowledge. The Certification Program targets Security Officers, IT System Engineers, or System Administrators.

Certification Program Pricing

Maximum ten attendees in total from each organization. Pricing is based on whether the attendees are from or represent the same organization. The program takes place online.

  • First attendee: 1,000 €
  • All additional attendees (from the same organization): 500 €

Stay Up To Date With an Annual Subscription
Cyber security and Next-Gen Vulnerability Management is a space constantly evolving. To keep up with the latest cyber threats and best practices, know how to take advantage of our platform's regularly updated powerful features, and have the possibility to attend exclusively offered extension programs throughout the year, we highly recommended to sign up for our annual Certification Program subscription.

Holm Security Next-Gen VMP Certification

Become a Vulnerability Management Expert

Theoretical Training

General theoretical training within vulnerability management supervised by a qualified and trained instructor. 

Practical Experience

Get real-life experience and practice working with vulnerability management through practical training in Holm Security Next-Gen VMP. 


After the program, you will be certified in vulnerability management in general and our platform Holm Security Next-Gen VMP.  


Focus Areas in the Certification Program

Best Practices

What should you scan, and how often? We'll help you on the way. We'll go over all the best practices of vulnerability management.

Work Processes

How to make vulnerability management a part of your day-to-day work for a more proactive and effective cyber security defense.

Vulnerability Management KPIs

Which KPIs should you focus on? We help you understand the most important metrics.

Structure & Prioritize

Vulnerability Management can lead to information overflow. Learn how to structure and prioritize assets and vulnerabilities.