Home Link
About UsOur PartnersBlogCourse Login
  • For Workers & Job Seekers
  • For Businesses & Employers
  • Courses & Training
Contact Us
Back to all courses

Threats and Vulnerabilities Scenarios

$79
Self-Paced5 Course Hours | 12 Weeks
View Course
Cybersecurity & CISSP®
Threats and Vulnerabilities Scenarios

Description

This course examines the process of identifying and mitigating threats and vulnerabilities in information systems. It covers common categories of threats and vulnerabilities and the resources used to detect them. This course also features a number of fictional scenarios based on threats and vulnerabilities. This course is designed for IT professionals and other adult learners who are interested in information technology security, with an eye towards handling real-world scenarios.

credits

  • PMI PDUs: 5
  • Strategic & Business Management PDUs: 1.5
  • Technical PM PDUs: 3.5
  • IACET CEUs: 0.5
  • HRCI Credits: 5
    • Specified - Strategic Business: 5
  • SHRM PDCs: 5

features

  • Mobile-friendly
  • Audio-enabled
  • Badge and credit-awarding
  • Real-world case studies
  • Fully accessible
  • Games & Flashcards
  • Expert-supported
  • Video content

learning Outcomes

  • Discuss the role of governance and auditing in identifying threats and vulnerabilities
  • Identify common vulnerabilities and how penetration testing and other methods can reveal them
  • Explain how threats and vulnerabilities factor into risk analysis and lead to differing risk management strategies
  • Describe the difference between quantitative and qualitative risk analysis
  • Evaluate different security controls such as firewalls, IDS, IPS, antimalware and patch management
  • Identify common threats and other attacks on networks and their hosts
  • Respond appropriately to threats and vulnerabilities raised in real-world scenarios

related courses

Home LinkThe REDC is a Division of Yavapai College.Go to yc.edu
Contact Us