Vulnerability Assessment & Mitigation

Expert
  • 10 videos | 48m 26s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 123 users Rating 4.6 of 123 users (123)
Explore the domain of security assessment, design, and mitigation for web-based, mobile, and embedded systems. This course will start by examining common web-based attacks, such as SQL injection, cross-site scripting (XSS), cross-site request forgery (CSRF), carjacking, clickjacking, and cookie exploits. Next, you will learn how to evaluate general strategies to mitigate vulnerability. The course then moves on to mitigation strategies fo rmobiles, such as containerization, sandboxes, wrappers, secure encrypted enclaves, TPM, and tokenization. You will then study enterprise mobility management methods, privacy concerns, and security issues. Other topics include how to assess vulnerabilities and common threats for embedded devices; and how to walk through methods to reduce embedded device vulnerability. Finally, as a review exercise, you will describe how to assess and mitigate systems vulnerabilities.

WHAT YOU WILL LEARN

  • Assess vulnerabilities in web-based systems
    Describe common web-based attacks
    Reduce security vulnerabilities in various web-based systems
    Define enterprise mobility management
    Describe issues related to mobile security and privacy
  • Reduce security vulnerabilities in mobile systems
    Assess vulnerabilities in embedded devices
    Describe and compare common threats to embedded devices
    Reduce various embedded device vulnerabilities
    Describe how to assess and mitigate systems vulnerabilities

IN THIS COURSE

  • 2m 31s
    In this video, you will learn how to assess vulnerabilities in web-based systems. FREE ACCESS
  • 7m 21s
    Upon completion of this video, you will be able to describe common attacks that occur on the web. FREE ACCESS
  • Locked
    3.  Vulnerability Mitigation for Web-based Systems
    5m 15s
    Learn how to reduce security vulnerabilities in various web-based systems. FREE ACCESS
  • Locked
    4.  Enterprise Mobility Management
    4m 6s
    In this video, you will learn how to define enterprise mobility management. FREE ACCESS
  • Locked
    5.  Mobility Security and Privacy Concerns
    9m 52s
    After completing this video, you will be able to describe issues related to mobile security and privacy. FREE ACCESS
  • Locked
    6.  Vulnerability Mitigation for Mobile Systems
    4m 58s
    In this video, find out how to reduce security vulnerabilities in mobile systems. FREE ACCESS
  • Locked
    7.  Embedded Device Vulnerabilities
    3m 46s
    In this video, learn how to assess vulnerabilities in embedded devices. FREE ACCESS
  • Locked
    8.  Common Threats to Embedded Devices
    2m 31s
    Upon completion of this video, you will be able to describe and compare common threats to embedded devices. FREE ACCESS
  • Locked
    9.  Vulnerability Mitigation for Embedded Devices
    5m 45s
    During this video, you will learn how to reduce various vulnerabilities in embedded devices. FREE ACCESS
  • Locked
    10.  Exercise: Describing Vulnerability Mitigation
    2m 22s
    After completing this video, you will be able to describe how to assess and mitigate system vulnerabilities. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.4 of 17 users Rating 4.4 of 17 users (17)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.3 of 391 users Rating 4.3 of 391 users (391)
Rating 4.4 of 31 users Rating 4.4 of 31 users (31)
Rating 4.6 of 185 users Rating 4.6 of 185 users (185)