Threat and Vulnerability Management for CompTIA CySA+

This course will teach you how to detect and mitigate vulnerabilities in your environment by using, tweaking, and understanding a vulnerability management solution
Course info
Rating
(24)
Level
Intermediate
Updated
Sep 24, 2020
Duration
3h 13m
Table of contents
Course Overview
Implementing a Vulnerability Management Program
Configuring and Implementing Vulnerability Scans
Analyzing Vulnerability Scan Results
Remediating Vulnerabilities
Analyzing Access Control Permissions and Vulnerabilities
Detecting and Preventing Application Security Attacks
Emulating Adversaries to Identify Common Vulnerabilities
Identifying the Threats of Specialized Technologies
Description
Course info
Rating
(24)
Level
Intermediate
Updated
Sep 24, 2020
Duration
3h 13m
Your 10-day individual free trial includes:

Expert-led courses

Keep up with the pace of change with thousands of expert-led, in-depth courses.
Description

Networks aren’t what they used to be. They’re more complex than ever. Systems today are so interconnected and buried within those systems are thousands of undetected security vulnerabilities waiting to be used against you. Vulnerability management systems are designed to recognize, rank, and remediate these vulnerabilities before an attacker gets ahold of them and exploits them to destabilize the privacy, integrity, or availability of your digital assets.

In this course, Threat and Vulnerability Management for CompTIA CySA+, you’ll learn how to better defend your organization from threats by using, tweaking, and understanding a vulnerability management solution.

First, you’ll explore how to design a vulnerability management program, execute vulnerability scans, and report and analyze the results from a scan.

Next, you’ll discover how you can remediate some of the vulnerabilities that you detect.

Finally, you’ll learn how to look at specialty systems including IoT, embedded and mobile devices for issues that might pop up on you.

When you’re finished with this course, you’ll have the skills and knowledge of security analysis needed to detect and mitigate vulnerabilities in your environment.

About the author
About the author

Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale's expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material.

More from the author
Cloud and Automation for CompTIA CySA+
Intermediate
56m
Dec 11, 2020
More courses by Dale Meredith
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hey everyone, my name is Dale Meredith, and I'm really excited to welcome you to my course, Threat and Vulnerability Management for CompTIA CySA+. Now you may be asking yourself, who is this Dale guy? Well, I've been a Microsoft trainer since 1998 and a certified ethical hacker since the early 2000s, as well as a certified EC‑Council trainer. I've taught audiences around the world, varying from universities to Inc. 500 companies, and even several US government agencies, including some of the men and women of our military with some of the CompTIA courses. Now this course is the third course in your journey towards CySA certification. In this course, Threat and Vulnerability Management for CompTIA CySA+, you'll learn to better defend your organization from threats by using tweaking and understanding of vulnerability management solution. First, you'll explore how to design a vulnerability management program, or what we refer to as a VMP, execute vulnerability scans, and report and do the analysis of the results of the scan. Next, you'll discover how to remediate some of the vulnerabilities that we find. And then finally, you'll learn how to look at some specialized systems, including IoT, embedded, mobile devices for issues that might actually pop up on you. Now when you're finished with this course, you'll have the skills and knowledge of a security analyst needed to detect and mitigate vulnerabilities in your network. From here, you can continue your learning by diving into some of our other cybersecurity courses on ethical hacking or possibly even penetration testing, or even some of our specialized security content done by some of the industry's best known cybersecurity trainers. I hope you'll join me in learning and understanding the concepts of threat and vulnerability management for CompTIA's CySA+, here at Pluralsight.