Vulnerabilities and Exploits
Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number
Expertise Level
Overview/Description
Discover how common threat sources actually get exploited, in the world of web security. During this course, you will learn about white hat hackers, social engineers, phishing, social engineering attempts, exploit kits, ransomware, state sponsored hacking, and bug bounties. See how web-based applications have become more popular and what popularity means for data security. Look at Web Application Firewalls (WAFs), and how they protect web applications. Identify disaster recovery terms, such as BCP, DRP, RTO, and RPO. As a review exercise, you will describe how malicious users use tools to exploit vulnerabilities.
Target Audience
Individuals and organizations interested in improving security at all IT levels, and security auditors
Prerequisites
None
Expected Duration (hours)
1.0
Lesson Objectives
Vulnerabilities and Exploits
sp_exsd_a02_it_enus
Expertise Level
Beginner