Vulnerabilities, Threats, and Attacks
Level: Advanced Beginner
Length: three weeks of online content, two full days of classroom instruction
Instructor: Chris Rodman
A defensive security team must be right every time, while an offensive threat actor only needs to be right once. Cybersecurity professionals should have a thorough understanding of the most common tools, techniques, and procedures threat actors use in order to lower their organization’s risk of being attacked.
Vulnerabilities, Threats, and Attacks addresses the different classes of vulnerabilities and types of threats, demonstrating how attackers use vulnerabilities in the various stages of an attack and how they leverage system flaws to facilitate attacks. Analyze case studies, frameworks, and assessments to understand how threats are modeled and build mitigation strategies to reduce organizational risk.
Skills You’ll Learn
- Recognize the different types of threats and threat actors to evaluate their risk to information systems
- Explain the types of vulnerabilities and how they affect different information system technologies and architectures
- Define the tools, techniques and procedures used in modern day attacks and determine mitigation strategies to address future attacks
- Differentiate between types of security assessment tests and understand how they can be used to reduce organizational risk
Before taking this course, you should be able to:
- Identify the components of modern software applications such as application front-end (i.e. web site, mobile app), application servers, data storage and code repositories
- Recognize the components that are involved with information system infrastructure such as client-based systems, server-based systems, cloud services, distributed systems, internet of things (IoT) and mobile systems
- Comfortably interact with Windows and/or Linux operating systems at both the graphical user interface and command-line level