Threat Management
About Course
The course transitions to examining the areas of our environment prone to vulnerabilities, beginning with an overview of what constitutes a vulnerability and how to establish an effective vulnerability assessment program. This discussion extends to modern attack methods, using real-world examples to illustrate how adversaries exploit vulnerabilities.
A major focus is placed on web application security, given the substantial risk posed by web application vulnerabilities. An entire module is dedicated to exploring security concepts specific to web applications.
While adversaries may penetrate systems easily through vulnerabilities, they cannot remain completely undetected post-compromise. By utilizing hardware and software logging capabilities, we can detect adversaries more quickly. This approach to threat detection is covered in the penultimate module on Security Operations and Log Management.
Finally, the course emphasizes the importance of an effective incident response plan for addressing compromises in our environment. The methodology for a proper response is explored in detail in the final module.
Course Content
Introduction Threat Management
-
Introduction