35 minutes

Video Description

This module is shorter than many of the previous ones since many of the topics have been covered in other modules, however, the broader subject matter is important and we cover it in more depth in this module. We note that security must extend beyond basic input validation and testing software for risks. It must expand to include checking for vulnerabilities in hosts and the network itself. The types of security assessments we'll be covering in this module are vulnerability and penetration. In addition, we'll be discussing: - Remediation - Intrusion detection - Audit logs - Common vulnerabilities

Up Next