Security Vulnerabilities: Managing Threats & Vulnerabilities

Beginner
  • 14 Videos | 58m 56s
  • Includes Assessment
  • Earns a Badge
Likes 26 Likes 26
This 14-video course helps learners explore the threat categories in the STRIDE (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege) model for identifying computer security threats, including spoofing, tampering, repudiation, information disclosure, denial of service (DoS), and escalation of privilege. Key concepts covered in this course include categories of security vulnerabilities using the STRIDE model; how to recognize authenticity and identity spoofing threats; and how to validate integrity and tampering threats. Next, you will learn about authentication threats and non-repudiation, when used in security, for example, when a charge cannot be challenged; learn information threats such as privacy breaches or data leaks; and learn the threat of DoS attacks, a resource disruption attack when a user tries to connect. Learners continue by exploring the privilege escalation threat model; learning to recognize examples of security misconfiguration threats; and observing methods of brute force attacks and key sizes. Finally, learn to perform a local network scan and a targeted remote scan by using Nmap; and learn to perform a DoS vulnerability diagnostic test on a host.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    describe the categories of vulnerabilities using the STRIDE model
    describe authenticity and identity spoofing threats
    describe how to validate integrity and tampering threats
    describe authentication threats and non-repudiation
    describe information threats such as privacy breaches or data leaks
    describe the threat of denial of service attacks
  • describe the privilege escalation threat model
    recognize examples of security misconfiguration threats
    describe methods of brute force attacks and key sizes
    perform a local network scan using Nmap
    perform a targeted remote scan using Nmap
    perform a DOS vulnerability diagnostic test on a host
    summarize the key concepts covered in this course

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 51 Likes 51  
Likes 26 Likes 26  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE