Course details

Vulnerabilities and Exploits

Vulnerabilities and Exploits


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description
This course covers how common threat sources actually get exploited. You will learn about social engineering, exploit kits, ransomware, and much more.

Target Audience
Individuals and organizations interested in improving security at all IT levels, and security auditors

Prerequisites
None

Expected Duration (hours)
1.0

Lesson Objectives

Vulnerabilities and Exploits

  • start the course
  • describe what white hat hackers are and how they can help ameliorate the security of a business or product
  • describe what social engineering is and why it can be so dangerous
  • specify how phishing can affect the security of a business
  • recognize deceptive e-mail messages
  • describe how exploit kits can be used to take advantage of vulnerabilities in operating systems and applications
  • define ransomware attacks and how they can affect sensitive data
  • describe how the influence of governments in hacking incidents has become a large issue for IT security
  • specify how bug bounties can help result in more exploits being found and fixed
  • describe how web-based applications have gained more popularity and what implications for data security they have
  • describe how WAFs can protect web applications
  • list and define disaster recovery terms such as BCP, DRP, RTO, and RPO
  • dsecribe how malicious users use tools to exploit vulnerabilities
  • Course Number:
    sp_exsd_a02_it_enus

    Expertise Level
    Beginner