Curriculum
- 1 Section
- 11 Lessons
- 10 Weeks
Expand all sectionsCollapse all sections
- Threat and Vulnerability Management11
- 1.1Explain the importance of threat data and intelligence.33 Minutes
- 1.2Given a scenario, utilize threat intelligence to support organizational security.39 Minutes
- 1.3Given a scenario, perform vulnerability management activities.49 Minutes
- 1.4Given a scenario, analyze the output from common vulnerability assessment tools – Part 156 Minutes
- 1.5Explain the threats and vulnerabilities associated with specialized technology – Part 133 Minutes
- 1.6Explain the threats and vulnerabilities associated with operating in the cloud – Part 112 Minutes
- 1.7Given a scenario, implement controls to mitigate attacks and software vulnerabilities – Part 146 Minutes
- 1.8Given a scenario, Analyze the output from common vulnerability assessment tools – Part 232 Minutes
- 1.9Explain the threats and vulnerabilities associated with operating in the cloud – Part 227 Minutes
- 1.10Given a scenario, Implement controls to mitigate attacks and software vulnerabilities – Part 234 Minutes
- 1.11Explain the threats and vulnerabilities associated with specialized technology – Part 218 Minutes
Given a scenario, Implement controls to mitigate attacks and software vulnerabilities – Part 2
Prev