Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
This module is shorter than many of the previous ones since many of the topics have been covered in other modules, however, the broader subject matter is important and we cover it in more depth in this module. We note that security must extend beyond basic input validation and testing software for risks. It must expand to include checking for vulnerabilities in hosts and the network itself. The types of security assessments we'll be covering in this module are vulnerability and penetration. In addition, we'll be discussing: - Remediation - Intrusion detection - Audit logs - Common vulnerabilities