Key Takeaways - Vulnerability Management: Terms to Know
35 hours 10 minutes
Hello and welcome back to the cyber is camped here. Certified advance security practitioners Certification preparation course again, This is a continuation off Marge. Number two. We're just tired. Abundantly management again. These were the objectives and order which they were covered doing this particular marjah, which is margin number two.
Let's not turn our teacher or discussion of some key takeaways
and some terms that you need to know
I'm doing this particular course instruction. We began, obviously looking at marginal to we begin in prices by discussing some new cybersecurity world we learned. Obviously, it's a bold new world. We discuss why there's an increase in the cyber intelligence. We took a look at previous defense strategies. We did find what threat model is, and other words we learned that it consist of
assets, threats and attacks who also took a look at the top
10 security vulnerabilities that regards to Web applications. We also discuss what is vulnerably assessment. Then we also discussed a different arena vulnerably scan as well penetration test. During the course of this particular margin, number two now hear some terms that you need to know threaten modeling,
do it intelligence, cyber intelligence
vulnerability, assessment, penetration, testing
bomblet. Imagine bubbly scanning
and the upcoming topics. We'll be moving on our discussion by taking a look at Marginal three, which is titled
Organizational Security Again. I look forward to seeing you in the next video.
The CompTIA CASP+ Practice-Lab will provide you with the necessary platform to gain hands-on skills ...
Become a SOC Analyst - Level 3
This Career Path is for a Security Operations Center Analyst (SOC Analyst). This particular Career ...