Lesson 1
Introduction to Vulnerability and Risk
Get your first look at vulnerability assessment and where you’ll go throughout this course.
Course
In this course, you will learn how security analysts address system vulnerabilities in order to reduce organizational risk. You will first learn about vulnerabilities, their characteristics, as well as their dynamic lifecycle. You will then explore the ways analysts assess vulnerabilities, including reviewing and administering scanning tools and utilities. You will learn how to measure the risks associated with discovered vulnerabilities. Lastly, you will review ways to communicate risk in order to plan remediation and mitigation activities.
In this course, you will learn how security analysts address system vulnerabilities in order to reduce organizational risk. You will first learn about vulnerabilities, their characteristics, as well as their dynamic lifecycle. You will then explore the ways analysts assess vulnerabilities, including reviewing and administering scanning tools and utilities. You will learn how to measure the risks associated with discovered vulnerabilities. Lastly, you will review ways to communicate risk in order to plan remediation and mitigation activities.
Vulnerability assessment
Security risk severity evaluation
Security assessment
Vulnerability lifecycle
Intermediate
4 weeks
Real-world Projects
Completion Certificate
Last Updated February 2, 2023
Client-server model
Database design
Lesson 1
Introduction to Vulnerability and Risk
Get your first look at vulnerability assessment and where you’ll go throughout this course.
Lesson 2
Understanding Vulnerabilities
Dive deeper into what vulnerabilities are, common types, and their relation to risk.
Lesson 3
Assessing Vulnerabilities
Learn how to perform vulnerability assessments and some of the tools to do so.
Lesson 4
Determining Risk and Business Impact
Determining the risks and impact to the business of the identified vulnerabilities, as well as considering how to mitigate them.
Lesson 5
Managing and Mitigating Risk
Finalize your vulnerability assessment with targeted summaries by audience and strategic guidance.
Lesson 6 • Project
Project: Juice Shop Vulnerabilities Report
Dive back into Juice Shop, this time to assess vulnerabilities and reduce risks related to the insecure application.
Richard Phung
INFORMATION SECURITY ANALYST
Richard is an SSCP, CISSP, and CIPP/US with over a decade of enterprise systems administration experience, working with businesses to meet the demands of a continually evolving threat landscape. Richard holds a BA in Psychology from Hendrix College and a Master's of Education from Lesley University.
Richard Phung
INFORMATION SECURITY ANALYST
Richard is an SSCP, CISSP, and CIPP/US with over a decade of enterprise systems administration experience, working with businesses to meet the demands of a continually evolving threat landscape. Richard holds a BA in Psychology from Hendrix College and a Master's of Education from Lesley University.
Get Started Today