Leadership Development
Technology & Data Science
Computer Applications
Cybersecurity & CISSP
Data Management & Analytics
Emerging Technologies
Web Design
Project Management
Organizational Effectiveness
Essential Business Functions
Innovation & Entrepreneurship
Personal Development
Teaching & Learning
Events & Community
Threats and Vulnerabilities Scenarios
Course Description
Examines the process of identifying and mitigating threats and vulnerabilities in information systems. Covers common categories of threats and vulnerabilities and the resources used to detect them. This course also features a number of fictional scenarios based on threats and vulnerabilities.
Learning Outcomes
After completing this course, the learner should be able to:
- Discuss the role of governance and auditing in identifying threats and vulnerabilities
- Identify common vulnerabilities and how penetration testing and other methods can reveal them
- Explain how threats and vulnerabilities factor into risk analysis and lead to differing risk management strategies
- Describe the difference between quantitative and qualitative risk analysis
- Evaluate different security controls such as firewalls, IDS, IPS, antimalware and patch management
- Identify common threats and other attacks on networks and their hosts
- Respond appropriately to threats and vulnerabilities raised in real-world scenarios