CompTIA Security+: Vulnerability Management
CompTIA Security+
| Beginner
- 8 videos | 26m 13s
- Includes Assessment
- Earns a Badge
Vulnerability management is an ongoing process designed to proactively protect computer systems, networks, and applications from cyberattacks and data breaches and is an integral part of your overall security system. Begin this course by exploring threat feeds like open-source intelligence (OSINT), Common Vulnerability Scoring System (CVSS), and Common Vulnerability Enumeration (CVE) to help gather information about potential threats or adversaries. Then you will investigate application vulnerability assessments for assigning severity levels, vulnerability scanning to identify known and unknown weaknesses, and penetration testing to simulate real-world attacks. Finally, you will discover vulnerability response and learn how to validate and report on remediation processes. This course is part of a series that prepares you for the CompTIA Security+ (SY0-701) exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseProvide an overview of various threat feeds, including open-source intelligence (osint), proprietary/third-party, information-sharing organizations, dark web, common vulnerability scoring system (cvss), and common vulnerability enumeration (cve)Outline application vulnerability assessments, including static analysis, dynamic analysis, and package monitoringOutline concepts of vulnerability scanning, including accuracy confirmation
-
Describe penetration testing and the penetration testing life cycleProvide an overview of vulnerability response and remediation, including topics like patching, insurance, segmentation, compensating controls, and exceptions and exemptionsValidate and report on remediation processes and proceduresSummarize the key concepts covered in this course
IN THIS COURSE
-
34sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
8m 31sAfter completing this video, you will be able to provide an overview of various threat feeds, including open-source intelligence (OSINT), proprietary/third-party, information-sharing organizations, dark web, Common Vulnerability Scoring System (CVSS), and Common Vulnerability Enumeration (CVE). FREE ACCESS
-
3m 9sUpon completion of this video, you will be able to outline application vulnerability assessments, including static analysis, dynamic analysis, and package monitoring. FREE ACCESS
-
4m 4sAfter completing this video, you will be able to outline concepts of vulnerability scanning, including accuracy confirmation. FREE ACCESS
-
4m 54sUpon completion of this video, you will be able to describe penetration testing and the penetration testing life cycle. FREE ACCESS
-
1m 44sAfter completing this video, you will be able to provide an overview of vulnerability response and remediation, including topics like patching, insurance, segmentation, compensating controls, and exceptions and exemptions. FREE ACCESS
-
2m 47sUpon completion of this video, you will be able to validate and report on remediation processes and procedures. FREE ACCESS
-
31sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.