Vulnerability Management for CySA+
Offered By: Pluralsight
Course Description
Overview
Keeping your organization safe from attackers is essential. This course will teach you about vulnerability analysis needed for the CYSA+ Exam.
A lack of vulnerability management leaves an organization open to potential attacks and data breaches. In this course, Vulnerability Management for CySA+, you’ll learn to effectively protect your resources from attackers. First, you’ll explore the various scanning methods a security professional should consider. Next, you’ll discover how to prioritize and analyze vulnerabilities. Finally, you’ll learn how to discover and mitigate different vulnerabilities. When you’re finished with this course, you’ll have the skills and knowledge of a security professional needed for the CYSA+ exam.
A lack of vulnerability management leaves an organization open to potential attacks and data breaches. In this course, Vulnerability Management for CySA+, you’ll learn to effectively protect your resources from attackers. First, you’ll explore the various scanning methods a security professional should consider. Next, you’ll discover how to prioritize and analyze vulnerabilities. Finally, you’ll learn how to discover and mitigate different vulnerabilities. When you’re finished with this course, you’ll have the skills and knowledge of a security professional needed for the CYSA+ exam.
Syllabus
- Course Overview 1min
- Implementing Vulnerability Scanning Techniques 20mins
- Interpreting Results from Vulnerability Assessment Tools 16mins
- Prioritizing Vulnerabilities through Data Analysis 10mins
- Mitigations for Software Vulnerabilities and Attacks 20mins
- Understanding Vulnerability Response, Handling, and Management Concepts 20mins
- Domain Summary 1min
Taught by
Dale Meredith
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network