Networks aren’t what they used to be. They’re more complex than ever. Systems today are so interconnected and buried within those systems are thousands of undetected security vulnerabilities waiting to be used against you. Vulnerability management systems are designed to recognize, rank, and remediate these vulnerabilities before an attacker gets ahold of them and exploits them to destabilize the privacy, integrity, or availability of your digital assets.
In this course, Threat and Vulnerability Management for CompTIA CySA+, you’ll learn how to better defend your organization from threats by using, tweaking, and understanding a vulnerability management solution.
First, you’ll explore how to design a vulnerability management program, execute vulnerability scans, and report and analyze the results from a scan.
Next, you’ll discover how you can remediate some of the vulnerabilities that you detect.
Finally, you’ll learn how to look at specialty systems including IoT, embedded and mobile devices for issues that might pop up on you.
When you’re finished with this course, you’ll have the skills and knowledge of security analysis needed to detect and mitigate vulnerabilities in your environment.
Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale's expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material.
Course Overview [Autogenerated] Hey, everyone, My name is DLL MEREDITH. I'm really excited to welcome you to my course threat and vulnerability management for camp to C. Y s a plus. Now you may be asking yourself Who is this Dale guy? Well, I've been a Microsoft trainer since 1998 and a certified ethical hacker since the early 2000, as well as a certified easy council trainer. I've taught audiences around the world varying from universities to Inc 500 companies and even several US government agencies, including some of the men and women of our military with some of the camp to courses. Now, this course is the third course in your journey towards C. Y. S a certification in this course threat and vulnerability management for come to U. C. Y s a plus. You'll learn to better defend your organization from threats by using tweaking and understanding of vulnerability management solution. First, you'll explore how to design a vulnerability management program or what we refer to as a BNP executable ity scans and report and do the analysis of the results of the scan. Next, you'll discover how to re mediate some of the vulnerabilities that we find. And then finally, you'll learn how to look a TsUM specialized systems, including i O T embedded mobile devices for issues that might actually pop up on you. Now, when you're finished with this course, you'll have the skills and knowledge of a security analysis needed to detect and mitigate vulnerabilities in your network. From here, you can continue your learning by diving into some of our other cybersecurity courses on ethical hacking or possibly even ___________, testing or even some of our specialized security content done by some of the industry's best known cybersecurity trainers. I hope you'll join me in learning and understanding the concepts of threat and vulnerability management for com T. A C. Y s a plus here at Pluralsight.