Vulnerability Assessment & Mitigation
Expert
- 10 videos | 48m 26s
- Includes Assessment
- Earns a Badge
Explore the domain of security assessment, design, and mitigation for web-based, mobile, and embedded systems. This course will start by examining common web-based attacks, such as SQL injection, cross-site scripting (XSS), cross-site request forgery (CSRF), carjacking, clickjacking, and cookie exploits. Next, you will learn how to evaluate general strategies to mitigate vulnerability. The course then moves on to mitigation strategies fo rmobiles, such as containerization, sandboxes, wrappers, secure encrypted enclaves, TPM, and tokenization. You will then study enterprise mobility management methods, privacy concerns, and security issues. Other topics include how to assess vulnerabilities and common threats for embedded devices; and how to walk through methods to reduce embedded device vulnerability. Finally, as a review exercise, you will describe how to assess and mitigate systems vulnerabilities.
WHAT YOU WILL LEARN
-
Assess vulnerabilities in web-based systemsDescribe common web-based attacksReduce security vulnerabilities in various web-based systemsDefine enterprise mobility managementDescribe issues related to mobile security and privacy
-
Reduce security vulnerabilities in mobile systemsAssess vulnerabilities in embedded devicesDescribe and compare common threats to embedded devicesReduce various embedded device vulnerabilitiesDescribe how to assess and mitigate systems vulnerabilities
IN THIS COURSE
-
2m 31sIn this video, you will learn how to assess vulnerabilities in web-based systems. FREE ACCESS
-
7m 21sUpon completion of this video, you will be able to describe common attacks that occur on the web. FREE ACCESS
-
5m 15sLearn how to reduce security vulnerabilities in various web-based systems. FREE ACCESS
-
4m 6sIn this video, you will learn how to define enterprise mobility management. FREE ACCESS
-
9m 52sAfter completing this video, you will be able to describe issues related to mobile security and privacy. FREE ACCESS
-
4m 58sIn this video, find out how to reduce security vulnerabilities in mobile systems. FREE ACCESS
-
3m 46sIn this video, learn how to assess vulnerabilities in embedded devices. FREE ACCESS
-
2m 31sUpon completion of this video, you will be able to describe and compare common threats to embedded devices. FREE ACCESS
-
5m 45sDuring this video, you will learn how to reduce various vulnerabilities in embedded devices. FREE ACCESS
-
2m 22sAfter completing this video, you will be able to describe how to assess and mitigate system vulnerabilities. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.