Threat and Vulnerability Management for CompTIA CySA+
Offered By: Pluralsight
Course Description
Overview
This course will teach you how to detect and mitigate vulnerabilities in your environment by using, tweaking, and understanding a vulnerability management solution
Networks aren’t what they used to be. They’re more complex than ever. Systems today are so interconnected and buried within those systems are thousands of undetected security vulnerabilities waiting to be used against you. Vulnerability management systems are designed to recognize, rank, and remediate these vulnerabilities before an attacker gets ahold of them and exploits them to destabilize the privacy, integrity, or availability of your digital assets. In this course, Threat and Vulnerability Management for CompTIA CySA+, you’ll learn how to better defend your organization from threats by using, tweaking, and understanding a vulnerability management solution. First, you’ll explore how to design a vulnerability management program, execute vulnerability scans, and report and analyze the results from a scan. Next, you’ll discover how you can remediate some of the vulnerabilities that you detect. Finally, you’ll learn how to look at specialty systems including IoT, embedded and mobile devices for issues that might pop up on you. When you’re finished with this course, you’ll have the skills and knowledge of security analysis needed to detect and mitigate vulnerabilities in your environment.
Networks aren’t what they used to be. They’re more complex than ever. Systems today are so interconnected and buried within those systems are thousands of undetected security vulnerabilities waiting to be used against you. Vulnerability management systems are designed to recognize, rank, and remediate these vulnerabilities before an attacker gets ahold of them and exploits them to destabilize the privacy, integrity, or availability of your digital assets. In this course, Threat and Vulnerability Management for CompTIA CySA+, you’ll learn how to better defend your organization from threats by using, tweaking, and understanding a vulnerability management solution. First, you’ll explore how to design a vulnerability management program, execute vulnerability scans, and report and analyze the results from a scan. Next, you’ll discover how you can remediate some of the vulnerabilities that you detect. Finally, you’ll learn how to look at specialty systems including IoT, embedded and mobile devices for issues that might pop up on you. When you’re finished with this course, you’ll have the skills and knowledge of security analysis needed to detect and mitigate vulnerabilities in your environment.
Taught by
Dale Meredith
Related Courses
CiberseguridadUniversidad de los Andes via Coursera Cloud Audit Academy – クラウドにとらわれない (Japanese)
Amazon Web Services via AWS Skill Builder Cybersecurity Foundations for Risk Management
University System of Georgia via Coursera The Foundations of Cybersecurity
University System of Georgia via Coursera Get Started with Security Operations
Salesforce via Trailhead