YoVDO

Threats, Vulnerabilities, and Incident Response

Offered By: Udacity

Tags

Incident Response Courses Cybersecurity Courses Penetration Testing Courses Threat Identification Courses Vulnerability Scanning Courses

Course Description

Overview

Cybersecurity breaches happen when a threat is able to successfully exploit a vulnerability within a business. To avoid these attacks, security professionals must understand the threats the company is facing, including the various threat actors and their motivations. Security professionals must also be able to find vulnerabilities that can enable threats to attack through common practices such as vulnerability scanning and penetration testing. Finally, security professionals should be able to activate and follow incident response procedures to address cybersecurity incidents and breaches. Ultimately, during this course, students will learn how to identify security threats and gaps, fix issues, and respond to inevitable attacks.

Syllabus

  • Intro to Threats, Vulnerabilities, and Incident Response
    • Meet your instructor, discuss what you'll learn in this course, major stakeholders and a brief history, and a peek at the final project!

  • Assessing Threats
    • This lesson will cover threats and vulnerabilities, attack types, threat motivations, threats to organizations, and threat responses.
  • Finding Security Vulnerabilities
    • In this lesson, we'll be discussing attack methods, scanning for vulnerabilities, and penetration testing.
  • Fixing Security Vulnerabilities
    • We're going to cover how to conduct vulnerability research, test and apply results, and how to prioritize and strategize the results in this lesson.
  • Preparing for Inevitable Attacks
    • Finally, we're going to cover incidents and recovery, events and incidents, the response lifecycle, and roles and response plans.
  • Navigating a Cybersecurity Incident
    • During the project, you'll summarize and profile a cyber threat, conduct a vulnerability scan, research, analyze and prioritize vulnerabilities, and finally - document incident response actions.

Taught by

Christine Izuakor, PhD, CISSP

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network