Pluralsight is not an official partner or accredited training center of EC-Council. One reason for security compromises is the lack of continuous monitoring to ensure assets are adequately protected. You need to know which organization assets require the most protection, but protection is only possible if you understand the threats. This course, Risks, Vulnerabilities, and Threats, will give you the skills needed to identify risks, to understand how malware and other malicious attacks are executed, and how to put effective security controls in place. When you're finished this course, you'll also know how to conduct periodic vulnerability scans in Windows and Linux to keep up with changing threats.
Daniel Lachance, CompTIA Security+, CompTIA A+®, CompTIA Network+®, CompTIA Server+, CompTIA Cloud Essentials, MCITP, MCTS, MCSA, is the owner of Lachance IT Consulting Inc. He is the author of the CompTIA Server+ Certification All-in-One Exam Guide, CompTIA Cloud Essentials Certification Study Guide, and co-author of CompTIA Security+ Certification Practice Exams.
Course Overview Hey everyone. My name is Dan Lachance, and welcome to my course, Risks, Vulnerabilities, and Threats. Doing business in today's world means using a wide variety of technological solutions, and inevitability their use introduces risk. So therefore, there are enterprise risk management frameworks that can provide guidelines for organizations to put effective security controls in place to protect their assets. There are also technical controls that can mitigate the impact of other threats like malware, but user awareness is a big part of the solution. By understanding how attackers scan systems, how they spoof packets and compromise passwords, you can better put defense mechanisms in place. Keeping IT systems secured also means that we've got to be running periodic vulnerability scans. So some of the major topics that we're going to cover in this course include risk assessments, malware types and mitigations, network reconnaissance and password attacks, conducting network vulnerability scans. As a result, by the end of this course, you'll not only gain insight as to how attackers begin infiltrating networks and hosts, but you'll also gain a sense of how do we effectively mitigate these threats. Before beginning this course, make sure you feel comfortable navigating around Windows and Linux. I hope you'll join me to learn about how to deal with security threats within the Risks, Vulnerabilities, and Threats course here at Pluralsight.