Vulnerability Assessment & Mitigation

  • 10 Videos | 52m 56s
  • Includes Assessment
  • Earns a Badge
Likes 114 Likes 114
Explore the domain of security assessment, design, and mitigation for web-based, mobile, and embedded systems. This course will start by examining common web-based attacks, such as SQL injection, cross-site scripting (XSS), cross-site request forgery (CSRF), carjacking, clickjacking, and cookie exploits. Next, you will learn how to evaluate general strategies to mitigate vulnerability. The course then moves on to mitigation strategies fo rmobiles, such as containerization, sandboxes, wrappers, secure encrypted enclaves, TPM, and tokenization. You will then study enterprise mobility management methods, privacy concerns, and security issues. Other topics include how to assess vulnerabilities and common threats for embedded devices; and how to walk through methods to reduce embedded device vulnerability. Finally, as a review exercise, you will describe how to assess and mitigate systems vulnerabilities.

WHAT YOU WILL LEARN

  • assess vulnerabilities in web-based systems
    describe common web-based attacks
    reduce security vulnerabilities in various web-based systems
    define enterprise mobility management
    describe issues related to mobile security and privacy
  • reduce security vulnerabilities in mobile systems
    assess vulnerabilities in embedded devices
    describe and compare common threats to embedded devices
    reduce various embedded device vulnerabilities
    describe how to assess and mitigate systems vulnerabilities

IN THIS COURSE

  • Playable
    1. 
    Web-based System Vulnerabilities
    2m 31s
    UP NEXT
  • Playable
    2. 
    Common Attacks on Web-based Systems
    7m 21s
  • Locked
    3. 
    Vulnerability Mitigation for Web-based Systems
    5m 15s
  • Locked
    4. 
    Enterprise Mobility Management
    4m 6s
  • Locked
    5. 
    Mobility Security and Privacy Concerns
    9m 52s
  • Locked
    6. 
    Vulnerability Mitigation for Mobile Systems
    4m 58s
  • Locked
    7. 
    Embedded Device Vulnerabilities
    3m 46s
  • Locked
    8. 
    Common Threats to Embedded Devices
    2m 31s
  • Locked
    9. 
    Vulnerability Mitigation for Embedded Devices
    5m 45s
  • Locked
    10. 
    Exercise: Describing Vulnerability Mitigation
    2m 22s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 23 Likes 23  
Likes 10 Likes 10  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 116 Likes 116  
Likes 177 Likes 177  
Likes 105 Likes 105