Explain the importance of threat data and intelligence.00:33:18
Utilize threat intelligence to support organizational security.00:39:08
Perform vulnerability management activities.00:49:24
Analyze the output from common vulnerability assessment tools – Part100:56:01
Analyze the output from common vulnerability assessment tools – Part 200:32:42
Explain the threats and vulnerabilities associated with specialized technology – Part 100:33:18
Explain the threats and vulnerabilities associated with specialized technology – Part 200:18:11
Explain the threats and vulnerabilities associated with operating in the cloud – Part 100:12:51
Explain the threats and vulnerabilities associated with operating in the cloud – Part200:27:59
Implement controls to mitigate attacks and software vulnerabilities – part100:46:00
Implement controls to mitigate attacks and software vulnerabilities – part200:34:11