Vulnerability Management for CySA+
Offered By: Pluralsight
Course Description
Overview
Keeping your organization safe from attackers is essential. This course will teach you about vulnerability analysis needed for the CYSA+ Exam.
A lack of vulnerability management leaves an organization open to potential attacks and data breaches. In this course, Vulnerability Management for CySA+, you’ll learn to effectively protect your resources from attackers. First, you’ll explore the various scanning methods a security professional should consider. Next, you’ll discover how to prioritize and analyze vulnerabilities. Finally, you’ll learn how to discover and mitigate different vulnerabilities. When you’re finished with this course, you’ll have the skills and knowledge of a security professional needed for the CYSA+ exam.
A lack of vulnerability management leaves an organization open to potential attacks and data breaches. In this course, Vulnerability Management for CySA+, you’ll learn to effectively protect your resources from attackers. First, you’ll explore the various scanning methods a security professional should consider. Next, you’ll discover how to prioritize and analyze vulnerabilities. Finally, you’ll learn how to discover and mitigate different vulnerabilities. When you’re finished with this course, you’ll have the skills and knowledge of a security professional needed for the CYSA+ exam.
Syllabus
- Course Overview 1min
- Implementing Vulnerability Scanning Techniques 20mins
- Interpreting Results from Vulnerability Assessment Tools 16mins
- Prioritizing Vulnerabilities through Data Analysis 10mins
- Mitigations for Software Vulnerabilities and Attacks 20mins
- Understanding Vulnerability Response, Handling, and Management Concepts 20mins
- Domain Summary 1min
Taught by
Dale Meredith
Related Courses
Unlocking Information Security II: An Internet PerspectiveTel Aviv University via edX Cybersecurity Capstone: Breach Response Case Studies
IBM via Coursera Complete Ethical Hacking Bootcamp
Udemy Cyber Security Advanced Persistent Threat Defender Preview
Udemy Performing Threat Modeling with the PASTA Methodology
Pluralsight