This MicroCourse is part of a Career Path: Become a Cyber Security Engineer

Course Content

Module 1: Course Module 1

15:54
1.1 Types of Malware (part 1)
08:43
1.2 Types of Malware (part 2)
18:19
1.3 Phishing
08:07
1.4 Various Types of Attacks
05:42
1.5 Social Engineering
06:56
1.6 Types of Wireless Attacks

Module 2: Course Module 2

04:19
2.1 Application Attacks
04:47
2.2 Attacks (LDAP ,XML) Injection
05:27
2.3 Zero Day Exploits, Cookies and Attachments
09:56
2.4 Mitigation and Deterrent Techniques

Module 3: Course Module 3

08:46
3.1 Security Traits and Vulnerabilities
04:51
3.2 Assessment Techniques
05:05
3.3 Penetration Testing vs Vulnerability Scanning (part 1)
04:47
3.4 Penetration Testing vs Vulnerability Scanning (part 2)
00:00
3.5 Fundamental Vulnerability Management

Course Description

What is Vulnerability Management? Vulnerability Management is a continuous information security risk process that requires management oversight and includes a 4-tier approach of: discovery, reporting, prioritization, and response. Why do I need this Certification? Many companies, organizations, and even medical facilities are required to meet a certain compliance with regards to vulnerability management. And while the effort and complexity of vulnerability management can be overwhelming to those entities, it is an easy task for professionals versed in the high-level process. What will I learn? How to use popular scanning tools How to deliver progress reports How to implement increased system coverage Get your Certification in Fundamental Vulnerability Management Today: Many companies, organizations, and even medical facilities are required to meet a certain compliance with regards to vulnerability management. And while the effort and complexity of vulnerability management can be overwhelming to those entities, it is an easy task for professionals versed in the high-level process. Vulnerability Management is a continuous information security risk process that requires management oversight and includes a 4-tier approach of: discovery, reporting, prioritization, and response. The objective for Vulnerability Management Analysts is to determine internal and external weaknesses, report and resolve them. This Micro Certification covers usage of popular scanning tools, delivery of progress reports, and implementation of increased system coverage. Although somewhat similar to penetration testing, the difference lies in the fact that vulnerability assessment lacks exploitation. But one thing is certain, it is a necessity. In a post from Tenable Network Security, they discuss how a particular industry is at the forefront of vulnerability management and further driving it?s? need.

Instructed By

Instructor Profile Image
John Oyeleke
Instructor

Provided By

Cybrary Logo

Course Components

On Demand Videos to learn from industry leaders
Assessments to gauge understanding and comprehension

Certificate of Completion

Certificate Of Completion

Complete this entire course to earn a Fundamental Vulnerability Management Certificate of Completion

Comprehensive Learning

See the full benefits of our immersive learning experience with interactive courses and guided career paths.