Risks, Vulnerabilities, and Threats
Pluralsight
Course Summary
Effectively securing networks and hosts means first identifying threats to assets. This course covers risk assessments, malware mitigation, malicious attack types, and vulnerability scans.
-
+
Course Description
One reason for security compromises is the lack of continuous monitoring to ensure assets are adequately protected. You need to know which organization assets require the most protection, but protection is only possible if you understand the threats. This course, Risks, Vulnerabilities, and Threats, will give you the skills needed to identify risks, to understand how malware and other malicious attacks are executed, and how to put effective security controls in place. When you're finished this course, you'll also know how to conduct periodic vulnerability scans in Windows and Linux to keep up with changing threats.
-
+
Course Syllabus
Course Overview- 1m 37s
—Course Overview 1m 37sAnalyzing Risk- 22m 41s
—Module Overview 8m 31s
—Recovery Time Objective and Risk Management Overview 6m 13s
—Risk Assessments 2m 56s
—Risk Management Frameworks 3m 39s
—Module Summary 1m 19sMitigating Malware- 23m 11sAttack Defense Tactics- 43m 37sConducting Vulnerability Assessments- 24m 18s