Cybersecurity Threats, Vulnerabilities, and Mitigations

Overview

To become a well-rounded and effective cybersecurity professional you must have a good working knowledge of the common threats and vulnerabilities that affect today's computer networks and systems, so that you can better defend and mitigate against them. This series will equip you to list and define those threats and vulnerabilities such as Threat Actor types, Threat Vectors and Attack Surfaces. You'll also explore specific security vulnerabilities that affect Cloud, Application, Web, and Mobile as well as other common digital and hardware systems. This series will also train you to know the common indicators of malicious activities ranging from password-based attacks to application attacks and then explore many of the mitigation strategies that are used to defend against them.

Learning Style

On Demand

Length of course

7h 57m
24 Episodes

Here are the topics we'll cover

  • Course Overview
  • Threat Actors
  • Threat Vectors and Attack Surfaces
  • Security Vulnerabilities
  • Malicious Activity
  • Mitigations
Learning Options

Options for this course

Train your team
Stay ahead of the curve and future-proof your business with training programs designed for you.
Channel partners
Transform your experience and integrate with our unique evolving library of Audit, Cybersecurity, and Information Technology courses.
Individual learners
Learn at your own pace and get your certification training.