Threat and Vulnerability Management for CompTIA CySA+

This course will teach you how to detect and mitigate vulnerabilities in your environment by using, tweaking, and understanding a vulnerability management solution
Course info
Level
Intermediate
Updated
Sep 24, 2020
Duration
3h 13m
Table of contents
Course Overview
Implementing a Vulnerability Management Program
Configuring and Implementing Vulnerability Scans
Analyzing Vulnerability Scan Results
Remediating Vulnerabilities
Analyzing Access Control Permissions and Vulnerabilities
Detecting and Preventing Application Security Attacks
Emulating Adversaries to Identify Common Vulnerabilities
Identifying the Threats of Specialized Technologies
Description
Course info
Level
Intermediate
Updated
Sep 24, 2020
Duration
3h 13m
Description

Networks aren’t what they used to be. They’re more complex than ever. Systems today are so interconnected and buried within those systems are thousands of undetected security vulnerabilities waiting to be used against you. Vulnerability management systems are designed to recognize, rank, and remediate these vulnerabilities before an attacker gets ahold of them and exploits them to destabilize the privacy, integrity, or availability of your digital assets.

In this course, Threat and Vulnerability Management for CompTIA CySA+, you’ll learn how to better defend your organization from threats by using, tweaking, and understanding a vulnerability management solution.

First, you’ll explore how to design a vulnerability management program, execute vulnerability scans, and report and analyze the results from a scan.

Next, you’ll discover how you can remediate some of the vulnerabilities that you detect.

Finally, you’ll learn how to look at specialty systems including IoT, embedded and mobile devices for issues that might pop up on you.

When you’re finished with this course, you’ll have the skills and knowledge of security analysis needed to detect and mitigate vulnerabilities in your environment.

About the author
About the author

Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale's expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material.

More from the author
More courses by Dale Meredith
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
[Autogenerated] Hey, everyone. My name is Dale MEREDITH. I'm really excited to welcome you to my course threat and vulnerability management for camp Tia C. Y s a plus. Now you may be asking yourself Who is this Dale guy? Well, I've been a Microsoft trainer since 1998 and a certified ethical hacker since the early 2000, as well as a certified easy council trainer. I've taught audiences around the world varying from universities to Inc 500 companies and even several US government agencies, including some of the men and women of our military with some of the Camp TIA courses. Now, this course is the third course in your journey towards C. Y. S a certification in this course threat and vulnerability management for come to U. C. Y s a plus. You'll learn to better defend your organization from threats by using tweaking and understanding of vulnerability management solution. First, you'll explore how to design a vulnerability management program or what we refer to as a BNP execute vulnerability, scans and report and do the analysis of the results of the scan. Next, you'll discover how to re mediate some of the vulnerabilities that we find. And then finally, you'll learn how to look a TsUM specialized systems, including i O T embedded mobile devices for issues that might actually pop up on you. Now, when you're finished with this course, you'll have the skills and knowledge of a security analysis needed to detect and mitigate vulnerabilities in your network. From here, you can continue your learning by diving into some of our other cybersecurity courses on ethical hacking or possibly even ___________, testing or even some of our specialized security content done by some of the industry's best known cybersecurity trainers. I hope you'll join me in learning and understanding the concepts of threat and vulnerability management for com T. A C. Y s a plus here at Pluralsight.