Certification Program

With the help of Holm Security's Certification Program, you will gain all the knowledge and skills needed to implement a comprehensive vulnerability management strategy to stay one step ahead of cybercriminals. Completion of certification demonstrates a deep understanding of vulnerability management in general and expertise in Holm Security's platform, including product and technical knowledge. The Certification Program targets Security Officers, IT System Engineers, or System Administrators.

Certification Program Pricing

Maximum ten attendees in total from each organization. Pricing is based on whether the attendees are from or represent the same organization. The program takes place online.

  • First attendee: 1,000 €
  • All additional attendees (from the same organization): 500 €

Renewed annually
Cyber security and Next-Gen Vulnerability Management is a space that is constantly evolving. To keep up with the latest news, the Certification Program is renewed every year.
The price for the upcoming years is the same as for the first certification. If you would like to cancel the subscription for the Certification Program, this can be done at the latest in relation to upcoming invoicing.

We reserve the right to reschedule a training session if there are not enough registrants. We will notify you in advance if this is the case.


Holm Security Next-Gen VMP Certification

Become a Vulnerability Management Expert

Theoretical Training

General theoretical training within vulnerability management supervised by a qualified and trained instructor. 

Practical Experience

Get real-life experience and practice working with vulnerability management through practical training in Holm Security Next-Gen VMP. 


After the program, you will be certified in vulnerability management in general and our platform Holm Security Next-Gen VMP.  


Focus Areas in the Certification Program

Best Practices

What should you scan, and how often? We'll help you on the way. We'll go over all the best practices of vulnerability management.

Work Processes

How to make vulnerability management a part of your day-to-day work for a more proactive and effective cyber security defense.

Vulnerability Management KPIs

Which KPIs should you focus on? We help you understand the most important metrics.

Structure & Prioritize

Vulnerability Management can lead to information overflow. Learn how to structure and prioritize assets and vulnerabilities.