CompTIA Security+: Vulnerability Management

CompTIA Security+    |    Beginner
  • 8 videos | 26m 13s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 3 users Rating 5.0 of 3 users (3)
Vulnerability management is an ongoing process designed to proactively protect computer systems, networks, and applications from cyberattacks and data breaches and is an integral part of your overall security system. Begin this course by exploring threat feeds like open-source intelligence (OSINT), Common Vulnerability Scoring System (CVSS), and Common Vulnerability Enumeration (CVE) to help gather information about potential threats or adversaries. Then you will investigate application vulnerability assessments for assigning severity levels, vulnerability scanning to identify known and unknown weaknesses, and penetration testing to simulate real-world attacks. Finally, you will discover vulnerability response and learn how to validate and report on remediation processes. This course is part of a series that prepares you for the CompTIA Security+ (SY0-701) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Provide an overview of various threat feeds, including open-source intelligence (osint), proprietary/third-party, information-sharing organizations, dark web, common vulnerability scoring system (cvss), and common vulnerability enumeration (cve)
    Outline application vulnerability assessments, including static analysis, dynamic analysis, and package monitoring
    Outline concepts of vulnerability scanning, including accuracy confirmation
  • Describe penetration testing and the penetration testing life cycle
    Provide an overview of vulnerability response and remediation, including topics like patching, insurance, segmentation, compensating controls, and exceptions and exemptions
    Validate and report on remediation processes and procedures
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 34s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 8m 31s
    After completing this video, you will be able to provide an overview of various threat feeds, including open-source intelligence (OSINT), proprietary/third-party, information-sharing organizations, dark web, Common Vulnerability Scoring System (CVSS), and Common Vulnerability Enumeration (CVE). FREE ACCESS
  • Locked
    3.  Application Vulnerability Assessment
    3m 9s
    Upon completion of this video, you will be able to outline application vulnerability assessments, including static analysis, dynamic analysis, and package monitoring. FREE ACCESS
  • Locked
    4.  Vulnerability Scanning
    4m 4s
    After completing this video, you will be able to outline concepts of vulnerability scanning, including accuracy confirmation. FREE ACCESS
  • Locked
    5.  Penetration Testing
    4m 54s
    Upon completion of this video, you will be able to describe penetration testing and the penetration testing life cycle. FREE ACCESS
  • Locked
    6.  Vulnerability Response and Remediation
    1m 44s
    After completing this video, you will be able to provide an overview of vulnerability response and remediation, including topics like patching, insurance, segmentation, compensating controls, and exceptions and exemptions. FREE ACCESS
  • Locked
    7.  Remediation Validation and Reporting
    2m 47s
    Upon completion of this video, you will be able to validate and report on remediation processes and procedures. FREE ACCESS
  • Locked
    8.  Course Summary
    31s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 5.0 of 4 users Rating 5.0 of 4 users (4)
Rating 4.4 of 5 users Rating 4.4 of 5 users (5)