Threats and Vulnerabilities Scenarios
Threats and Vulnerabilities Scenarios
Regular price
$808 USD
Regular price
Sale price
$808 USD
Unit price
per
Enter the theater of digital threats. Engage with real-world scenarios, dissect vulnerabilities, and strategize on countermeasures. Equip yourself with the acumen to anticipate, respond, and neutralize. The stage is set for the ultimate cyber showdown.
Course Duration:5 hours
Credits:
CEU Credits: 0.5
AMA PCM CEU Credits: 0
PDU Credits: 5
HRCI Credits: 5
SHRM Credits: 5
CFRE Credits: 0
ATD CI Credits: 5
ACE Credits: 0
Course Description
This course examines the process of identifying and mitigating threats and vulnerabilities in information systems. It covers common categories of threats and vulnerabilities and the resources used to detect them. This course also features a number of fictional scenarios based on threats and vulnerabilities. This course is designed for IT professionals and other adult learners who are interested in information technology security, with an eye towards handling real-world scenarios.
Learning Outcomes
Discuss the role of governance and auditing in identifying threats and vulnerabilities
Identify common vulnerabilities and how penetration testing and other methods can reveal them
Explain how threats and vulnerabilities factor into risk analysis and lead to differing risk management strategies
Describe the difference between quantitative and qualitative risk analysis
Evaluate different security controls such as firewalls, IDS, IPS, antimalware and patch management
Identify common threats and other attacks on networks and their hosts
Respond appropriately to threats and vulnerabilities raised in real-world scenarios