Impacts from Vulnerability Types

  • 15 Videos | 52m 47s
  • Includes Assessment
  • Earns a Badge
Likes 90 Likes 90
There are a wide variety of impacts affecting every layer of the OSI model. Explore the effects that different vulnerability types can have on your environment.

WHAT YOU WILL LEARN

  • describe race conditions
    recognize system vulnerabilities
    specify improper input and error handling
    define misconfiguration
    describe resource exhaustion
    specify untrained users
    work with improperly configured accounts
    recognize vulnerable business processes
  • recognize weak cipher suites and implementations
    define memory and buffer vulnerability
    describe system sprawl and undocumented assets
    describe architecture and design weaknesses
    recognize new threats and zero day attacks
    define improper certificate and key management
    specify the impact of different types of vulnerabilities

IN THIS COURSE

  • Playable
    1. 
    Race Conditions
    2m 1s
    UP NEXT
  • Playable
    2. 
    System Vulnerabilities
    4m 1s
  • Locked
    3. 
    Improper Input and Error Handling
    2m 12s
  • Locked
    4. 
    Misconfiguration
    1m 40s
  • Locked
    5. 
    Resource Exhaustion
    2m 15s
  • Locked
    6. 
    Untrained Users
    3m 30s
  • Locked
    7. 
    Improperly Configured Accounts
    5m 10s
  • Locked
    8. 
    Vulnerable Business Processes
    3m 23s
  • Locked
    9. 
    Weak Cipher Suites and Implementations
    3m 53s
  • Locked
    10. 
    Memory and Buffer Vulnerability
    3m 23s
  • Locked
    11. 
    System Sprawl and Undocumented Assets
    2m 54s
  • Locked
    12. 
    Architecture and Design Weaknesses
    3m 33s
  • Locked
    13. 
    New Threats and Zero Day Attacks
    2m
  • Locked
    14. 
    Improper Certificate and Key Management
    2m 44s
  • Locked
    15. 
    Exercise: Identify the Impact of Vulnerabilities
    3m 7s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 37 Likes 37  
CHANNEL Cisco Security
Likes 99 Likes 99  
Likes 920 Likes 920  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 116 Likes 116  
Likes 263 Likes 263  
Likes 64 Likes 64