Estimated time to
complete: 5 hours
Self Paced Online Course Description:
This
course examines the process of identifying and mitigating threats
and vulnerabilities in information systems. It covers common
categories of threats and vulnerabilities and the resources used to
detect them. This course also features a number of fictional
scenarios based on threats and vulnerabilities. This course is
designed for IT professionals and other adult learners who are
interested in information technology security, with an eye towards
handling real-world scenarios.
What You Will Learn:
- Discuss the role of
governance and auditing in identifying threats and
vulnerabilities
- Identify common
vulnerabilities and how penetration testing and other methods
can reveal them
- Explain how threats
and vulnerabilities factor into risk analysis and lead to
differing risk management strategies
- Describe the
difference between quantitative and qualitative risk analysis
- Evaluate different
security controls such as firewalls, IDS, IPS, antimalware and
patch management
- Identify common
threats and other attacks on networks and their hosts
- Respond
appropriately to threats and vulnerabilities raised in
real-world scenarios
Key Features:
- Mobile-friendly
- Audio-enabled
- Badge and
credit-awarding
- Real-world case
studies
- Fully accessible
- Games &
Flashcards
- Expert-supported
- Video content
Price: $79.00
For a course preview and to register, click here!
|