Home Link
Quest Grant

For Businesses

Business Services

Helping the Businesses in our Community.

Regional Services

Everything you need to know to grow in Yavapai County.

Grant Assistance

From grant research to writing services.

Data and Analytics

Research for sustainable business growth.

About Yavapai County

Everything you need to know about commerce Yavapai County.

For Employees & Job Seekers

Career Resources

Personalized training, career counseling, scholarships, and more!

Training Courses

Learn new skills and get ready for your next career move.

Job Fairs and Events

Connect with employers through local job fairs and career events.

Hot Jobs

Top Jobs, Occupations, and Skills in Yavapai County

Job Postings Data Trends

Explore the latest data on job opportunities available from local employers


Loading upcoming events...

Training Courses

Training Course Options

See and compare the different course trainings available through the REDC.

Subject Matter Expert

Train employees and businesses in leadership, professional development, communication, and more

Back to all courses

Threats and Vulnerabilities Scenarios

Self-Paced5 Course Hours | 12 Weeks
View Course
Cybersecurity & CISSP®
Threats and Vulnerabilities Scenarios


This course examines the process of identifying and mitigating threats and vulnerabilities in information systems. It covers common categories of threats and vulnerabilities and the resources used to detect them. This course also features a number of fictional scenarios based on threats and vulnerabilities. This course is designed for IT professionals and other adult learners who are interested in information technology security, with an eye towards handling real-world scenarios.


  • PMI PDUs: 5
    • Strategic & Business Management PDUs: 1.5
      • Technical PM PDUs: 3.5
        • IACET CEUs: 0.5
          • HRCI Credits: 5
            • SHRM PDCs: 5


              • Mobile-friendly
              • Audio-enabled
              • Badge and credit-awarding
              • Real-world case studies
              • Fully accessible
              • Games & Flashcards
              • Expert-supported
              • Video content

              learning Outcomes

              • Discuss the role of governance and auditing in identifying threats and vulnerabilities
              • Identify common vulnerabilities and how penetration testing and other methods can reveal them
              • Explain how threats and vulnerabilities factor into risk analysis and lead to differing risk management strategies
              • Describe the difference between quantitative and qualitative risk analysis
              • Evaluate different security controls such as firewalls, IDS, IPS, antimalware and patch management
              • Identify common threats and other attacks on networks and their hosts
              • Respond appropriately to threats and vulnerabilities raised in real-world scenarios

              related courses

              • Cybersecurity & CISSP®
                Fundamentals of Application Security

                Fundamentals of Application Security

                Self-Paced3 Course Hours | 12 Weeks
              • Cybersecurity & CISSP®
                Identity and Access Management

                Identity and Access Management

                Self-Paced5 Course Hours | 12 Weeks
              • Cybersecurity & CISSP®
                Introduction to Cybersecurity Concepts and Practices

                Introduction to Cybersecurity Concepts and Practices

                Self-Paced5 Course Hours | 12 Weeks
              Home LinkThe REDC is a Division of Yavapai College.Go to yc.edu

              Sign up for the REDC Newsletter

              Stay in touch with the REDC and learn how we are impacting our community!
              Contact Us