Vulnerability Assessment & Mitigation

Expert
  • 10 Videos | 52m 56s
  • Includes Assessment
  • Earns a Badge
Likes 142 Likes 142
Explore the domain of security assessment, design, and mitigation for web-based, mobile, and embedded systems. This course will start by examining common web-based attacks, such as SQL injection, cross-site scripting (XSS), cross-site request forgery (CSRF), carjacking, clickjacking, and cookie exploits. Next, you will learn how to evaluate general strategies to mitigate vulnerability. The course then moves on to mitigation strategies fo rmobiles, such as containerization, sandboxes, wrappers, secure encrypted enclaves, TPM, and tokenization. You will then study enterprise mobility management methods, privacy concerns, and security issues. Other topics include how to assess vulnerabilities and common threats for embedded devices; and how to walk through methods to reduce embedded device vulnerability. Finally, as a review exercise, you will describe how to assess and mitigate systems vulnerabilities.

WHAT YOU WILL LEARN

  • assess vulnerabilities in web-based systems
    describe common web-based attacks
    reduce security vulnerabilities in various web-based systems
    define enterprise mobility management
    describe issues related to mobile security and privacy
  • reduce security vulnerabilities in mobile systems
    assess vulnerabilities in embedded devices
    describe and compare common threats to embedded devices
    reduce various embedded device vulnerabilities
    describe how to assess and mitigate systems vulnerabilities

IN THIS COURSE

  • Playable
    1. 
    Web-based System Vulnerabilities
    2m 31s
    UP NEXT
  • Playable
    2. 
    Common Attacks on Web-based Systems
    7m 21s
  • Locked
    3. 
    Vulnerability Mitigation for Web-based Systems
    5m 15s
  • Locked
    4. 
    Enterprise Mobility Management
    4m 6s
  • Locked
    5. 
    Mobility Security and Privacy Concerns
    9m 52s
  • Locked
    6. 
    Vulnerability Mitigation for Mobile Systems
    4m 58s
  • Locked
    7. 
    Embedded Device Vulnerabilities
    3m 46s
  • Locked
    8. 
    Common Threats to Embedded Devices
    2m 31s
  • Locked
    9. 
    Vulnerability Mitigation for Embedded Devices
    5m 45s
  • Locked
    10. 
    Exercise: Describing Vulnerability Mitigation
    2m 22s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 21 Likes 21  
Likes 29 Likes 29  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 196 Likes 196  
Likes 222 Likes 222  
Likes 114 Likes 114