CompTIA Cybersecurity Analyst+: Identifying & Reducing Vulnerabilities

Cyber Security    |    Intermediate
  • 13 videos | 1h 9m 56s
  • Includes Assessment
  • Earns a Badge
Rating 4.8 of 41 users Rating 4.8 of 41 users (41)
To reduce or eliminate attacks, you need to be able to identify potential weaknesses in your system. Discover how to conduct vulnerability scans and mitigate risks in order to protect IT assets.

WHAT YOU WILL LEARN

  • Identify security weaknesses in server oss
    Identify security weaknesses on endpoint devices
    Identify security weaknesses at the network level
    Identify security weaknesses on mobile devices
    Recognize the overall process of scanning for vulnerabilities
    Configure appropriate vulnerability scanning settings
    Explain how the scap standard is used to measure vulnerability issues and compliance
  • Conduct a vulnerability scan using nessus
    Distinguish various vulnerability scanning tools from one another
    Conduct a vulnerability scan using mbsa
    Understand vulnerability scan results
    Put controls in place to mitigate threats
    Reduce vulnerabilities that can be exploited

IN THIS COURSE

  • 6m 35s
    In this video, you will learn how to identify security weaknesses in server operating systems. FREE ACCESS
  • 7m 41s
    In this video, you will learn how to identify security weaknesses on endpoint devices. FREE ACCESS
  • Locked
    3.  Network Vulnerabilities
    7m 32s
    In this video, you will learn how to identify security weaknesses at the network level. FREE ACCESS
  • Locked
    4.  Mobile Device Vulnerabilities
    5m 46s
    Find out how to identify security weaknesses on mobile devices. FREE ACCESS
  • Locked
    5.  Vulnerability Scanning Overview
    7m 6s
    Upon completion of this video, you will be able to recognize the overall process of scanning for vulnerabilities. FREE ACCESS
  • Locked
    6.  Vulnerability Scanning Settings
    3m 28s
    In this video, you will configure the appropriate vulnerability scanning settings. FREE ACCESS
  • Locked
    7.  SCAP
    2m 26s
    After completing this video, you will be able to explain how the SCAP standard is used to measure vulnerability issues and compliance. FREE ACCESS
  • Locked
    8.  Scan for Vulnerabilities Using Nessus
    7m 48s
    In this video, you will learn how to conduct a vulnerability scan using Nessus. FREE ACCESS
  • Locked
    9.  Common Vulnerability Scanning Tools
    4m 38s
    Find out how to distinguish various vulnerability scanning tools from each other. FREE ACCESS
  • Locked
    10.  Scan for Vulnerabilities Using Microsoft Baseline Security Analyzer
    3m 5s
    In this video, you will learn how to conduct a vulnerability scan using Microsoft Baseline Security Analyzer. FREE ACCESS
  • Locked
    11.  Review Vulnerability Scan Results
    6m 28s
    After completing this video, you will be able to understand the results of a vulnerability scan. FREE ACCESS
  • Locked
    12.  Vulnerability Remediation
    4m 29s
    In this video, find out how to put controls in place to reduce the risk of threats. FREE ACCESS
  • Locked
    13.  Exercise: Describe Ways of Reducing Vulnerabilities
    2m 56s
    Learn how to reduce vulnerabilities that can be exploited. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 62 users Rating 4.7 of 62 users (62)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 4.6 of 55 users Rating 4.6 of 55 users (55)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 106 users Rating 4.4 of 106 users (106)
Rating 4.6 of 188 users Rating 4.6 of 188 users (188)
Rating 4.5 of 1341 users Rating 4.5 of 1341 users (1341)