Key Takeaways - Vulnerability Management: Terms to Know

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
35 hours 10 minutes
Difficulty
Advanced
CEU/CPE
35
Video Transcription
00:00
Hello and welcome back to the cyber is camped here. Certified advance security practitioners Certification preparation course again, This is a continuation off Marge. Number two. We're just tired. Abundantly management again. These were the objectives and order which they were covered doing this particular marjah, which is margin number two.
00:19
Let's not turn our teacher or discussion of some key takeaways
00:23
and some terms that you need to know
00:25
I'm doing this particular course instruction. We began, obviously looking at marginal to we begin in prices by discussing some new cybersecurity world we learned. Obviously, it's a bold new world. We discuss why there's an increase in the cyber intelligence. We took a look at previous defense strategies. We did find what threat model is, and other words we learned that it consist of
00:45
assets, threats and attacks who also took a look at the top
00:49
10 security vulnerabilities that regards to Web applications. We also discuss what is vulnerably assessment. Then we also discussed a different arena vulnerably scan as well penetration test. During the course of this particular margin, number two now hear some terms that you need to know threaten modeling,
01:07
do it intelligence, cyber intelligence
01:10
vulnerability, assessment, penetration, testing
01:12
bomblet. Imagine bubbly scanning
01:15
and the upcoming topics. We'll be moving on our discussion by taking a look at Marginal three, which is titled
01:23
Organizational Security Again. I look forward to seeing you in the next video.
Up Next