Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 44 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Security measures ; Computer security ; Cyberterrorism ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: This course will provide the foundational knowledge necessary to engage the vulnerability management team, support risk management, and collect data for risk assessments. Join expert Dean Bushmiller to learn the basis for scientifically defining and differentiating today's threats and vulnerabilities. Explore the best ways to identify and manage vulnerabilities using the CVE scoring system, the CAPEC system, the CWE system, and the MITRE ATT&CK matrix. What you'll learn and how you can apply it The components of vulnerabilities and threats and how to compare and contrast them The CVE vulnerability scoring system to prioritize actions The organization of the CAPEC system The root causes of hardware and software vulnerabilities Which vulnerability management system works with your environment How to interpret threat vulnerability reports and inform stakeholders This course is for you because: You're a professional looking to enter or advance in cybersecurity roles. You're a professional with cybersecurity as a component of your job description. You're a security analyst, vulnerability analyst, penetration tester, blue team technician, red team technician, network defense auditor, or risk assessor. Prerequisites: Equivalent knowledge of CompTIA Network+ certification Knowledge of the following: ports, protocols, services, OSI layers, routing, switching, IP addressing, wired and wireless networking infrastructure, network operations, and network troubleshooting tools. Recommended follow-up: Take Risk Management for Cybersecurity and IT Managers (video course with Jason Dion) Take System and Privacy Data Protection (video course with Aamir Lakhani).
    Note: Online resource; title from title details screen (O'Reilly, viewed October 11, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...