Threat and Vulnerability Management for CompTIA CySA+
Offered By: Pluralsight
Course Description
Overview
This course will teach you how to detect and mitigate vulnerabilities in your environment by using, tweaking, and understanding a vulnerability management solution
Networks aren’t what they used to be. They’re more complex than ever. Systems today are so interconnected and buried within those systems are thousands of undetected security vulnerabilities waiting to be used against you. Vulnerability management systems are designed to recognize, rank, and remediate these vulnerabilities before an attacker gets ahold of them and exploits them to destabilize the privacy, integrity, or availability of your digital assets. In this course, Threat and Vulnerability Management for CompTIA CySA+, you’ll learn how to better defend your organization from threats by using, tweaking, and understanding a vulnerability management solution. First, you’ll explore how to design a vulnerability management program, execute vulnerability scans, and report and analyze the results from a scan. Next, you’ll discover how you can remediate some of the vulnerabilities that you detect. Finally, you’ll learn how to look at specialty systems including IoT, embedded and mobile devices for issues that might pop up on you. When you’re finished with this course, you’ll have the skills and knowledge of security analysis needed to detect and mitigate vulnerabilities in your environment.
Networks aren’t what they used to be. They’re more complex than ever. Systems today are so interconnected and buried within those systems are thousands of undetected security vulnerabilities waiting to be used against you. Vulnerability management systems are designed to recognize, rank, and remediate these vulnerabilities before an attacker gets ahold of them and exploits them to destabilize the privacy, integrity, or availability of your digital assets. In this course, Threat and Vulnerability Management for CompTIA CySA+, you’ll learn how to better defend your organization from threats by using, tweaking, and understanding a vulnerability management solution. First, you’ll explore how to design a vulnerability management program, execute vulnerability scans, and report and analyze the results from a scan. Next, you’ll discover how you can remediate some of the vulnerabilities that you detect. Finally, you’ll learn how to look at specialty systems including IoT, embedded and mobile devices for issues that might pop up on you. When you’re finished with this course, you’ll have the skills and knowledge of security analysis needed to detect and mitigate vulnerabilities in your environment.
Taught by
Dale Meredith
Related Courses
AWS Lambda Function Security & Defense in Depth (Japanese)Amazon Web Services via AWS Skill Builder AWS Lambda Function Security & Defense in Depth (Korean)
Amazon Web Services via AWS Skill Builder AWS Network Firewall for Ingress/Egress Traffic (Traditional Chinese)
Amazon Web Services via AWS Skill Builder Cybersecurity for Business
University of Colorado System via Coursera CVE Series: PrintNightmare (CVE-2021-1675 and CVE-2021-34527)
Cybrary