Udacity Logo
Log InSign Up

Assessing Vulnerabilities and Reducing Risk

Course

In this course, you will learn how security analysts address system vulnerabilities in order to reduce organizational risk. You will first learn about vulnerabilities, their characteristics, as well as their dynamic lifecycle. You will then explore the ways analysts assess vulnerabilities, including reviewing and administering scanning tools and utilities. You will learn how to measure the risks associated with discovered vulnerabilities. Lastly, you will review ways to communicate risk in order to plan remediation and mitigation activities.

In this course, you will learn how security analysts address system vulnerabilities in order to reduce organizational risk. You will first learn about vulnerabilities, their characteristics, as well as their dynamic lifecycle. You will then explore the ways analysts assess vulnerabilities, including reviewing and administering scanning tools and utilities. You will learn how to measure the risks associated with discovered vulnerabilities. Lastly, you will review ways to communicate risk in order to plan remediation and mitigation activities.

Skills

Vulnerability assessment

Security risk severity evaluation

Security assessment

Vulnerability lifecycle

Intermediate

4 weeks

Real-world Projects

Completion Certificate

Last Updated February 2, 2023

Prerequisites:

Client-server model

Database design

Course Lessons

Lesson 1

Introduction to Vulnerability and Risk

Get your first look at vulnerability assessment and where you’ll go throughout this course.

Lesson 2

Understanding Vulnerabilities

Dive deeper into what vulnerabilities are, common types, and their relation to risk.

Lesson 3

Assessing Vulnerabilities

Learn how to perform vulnerability assessments and some of the tools to do so.

Lesson 4

Determining Risk and Business Impact

Determining the risks and impact to the business of the identified vulnerabilities, as well as considering how to mitigate them.

Lesson 5

Managing and Mitigating Risk

Finalize your vulnerability assessment with targeted summaries by audience and strategic guidance.

Lesson 6 • Project

Project: Juice Shop Vulnerabilities Report

Dive back into Juice Shop, this time to assess vulnerabilities and reduce risks related to the insecure application.

Taught By The Best

Photo of Richard Phung

Richard Phung

INFORMATION SECURITY ANALYST

Richard is an SSCP, CISSP, and CIPP/US with over a decade of enterprise systems administration experience, working with businesses to meet the demands of a continually evolving threat landscape. Richard holds a BA in Psychology from Hendrix College and a Master's of Education from Lesley University.

Taught By The Best

Photo of Richard Phung

Richard Phung

INFORMATION SECURITY ANALYST

Richard is an SSCP, CISSP, and CIPP/US with over a decade of enterprise systems administration experience, working with businesses to meet the demands of a continually evolving threat landscape. Richard holds a BA in Psychology from Hendrix College and a Master's of Education from Lesley University.

Get Started Today

Assessing Vulnerabilities and Reducing Risk