Program Objectives
Explain the importance of threat data and intelligence.
Utilize threat intelligence to support organizational security.
Perform vulnerability management activities.
Analyze the output from common vulnerability assessment tools.
Explain the threats and vulnerabilities associated with specialized technology.
Explain the threats and vulnerabilities associated with operating in the cloud.
Implement controls to mitigate attacks and software vulnerabilities.
Explain the importance of threat data and intelligence.00:33:00
Given a scenario, utilize threat intelligence to support organizational security.00:39:00
Given a scenario, perform vulnerability management activities.00:49:00
Given a scenario, analyze the output from common vulnerability assessment tools – Part 100:51:00
Given a scenario, Analyze the output from common vulnerability assessment tools – Part 200:32:41
Explain the threats and vulnerabilities associated with specialized technology – Part 100:33:00
Explain the threats and vulnerabilities associated with specialized technology – Part 200:18:00
Explain the threats and vulnerabilities associated with operating in the cloud – Part 100:16:26
Explain the threats and vulnerabilities associated with operating in the cloud – Part 200:24:22
Given a scenario, implement controls to mitigate attacks and software vulnerabilities – Part 100:46:00
Given a scenario, Implement controls to mitigate attacks and software vulnerabilities – Part 200:34:10