Threat Management

Categories: Cybersecurity, Network
Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

The course transitions to examining the areas of our environment prone to vulnerabilities, beginning with an overview of what constitutes a vulnerability and how to establish an effective vulnerability assessment program. This discussion extends to modern attack methods, using real-world examples to illustrate how adversaries exploit vulnerabilities.

A major focus is placed on web application security, given the substantial risk posed by web application vulnerabilities. An entire module is dedicated to exploring security concepts specific to web applications.

While adversaries may penetrate systems easily through vulnerabilities, they cannot remain completely undetected post-compromise. By utilizing hardware and software logging capabilities, we can detect adversaries more quickly. This approach to threat detection is covered in the penultimate module on Security Operations and Log Management.

Finally, the course emphasizes the importance of an effective incident response plan for addressing compromises in our environment. The methodology for a proper response is explored in detail in the final module.

Show More

What Will You Learn?

  • Comprehensive Vulnerability Management: Learn how to identify, assess, and mitigate vulnerabilities across various areas of your environment, including an in-depth focus on web application security.
  • Real-World Attack Methodologies: Gain insights into modern attack techniques and strategies through real-world examples, enabling you to better defend against adversaries.
  • Advanced Threat Detection: Understand how to leverage logging and monitoring capabilities in hardware and software to detect adversaries quickly and efficiently.
  • Effective Incident Response: Acquire the skills needed to develop and implement a robust incident response plan, ensuring your organization is prepared to respond to security breaches.

Course Content

Introduction Threat Management

  • Introduction

Vulnerability Scanning and Penetration Testing

Network Security Devices

Endpoint Security

SIEM-Log Management

Active Defense

Student Ratings & Reviews

No Review Yet
No Review Yet