Explain the importance of threat data and intelligence.00:33:18
Utilize threat intelligence to support organizational security.39:08
Perform vulnerability management activities.49:24
Analyze the output from common vulnerability assessment tools – Part156:01
Analyze the output from common vulnerability assessment tools – Part 232:42
Explain the threats and vulnerabilities associated with specialized technology – Part 100:33:18
Explain the threats and vulnerabilities associated with specialized technology – Part 200:18:11
Explain the threats and vulnerabilities associated with operating in the cloud – Part 112:51
Explain the threats and vulnerabilities associated with operating in the cloud – Part227:59
Implement controls to mitigate attacks and software vulnerabilities – part146:00
Implement controls to mitigate attacks and software vulnerabilities – part234:11