Description
Size: 14.8 GB
Topics include:
- Importance of Threat Data and Intelligence
- Utilizing Threat Intelligence to Support Organization Security
- Vulnerability Management Activities
- Analyzing Output from Common Vulnerability Assessment Tools
- Threats Associated with the Cloud and Specialized Technology
- Implementing Controls to Mitigate Attacks and for Software Vulnerabilities
- Analyzing Logs and Impact Analysis
Learn How To:
- Apply key threat intelligence and threat hunting concepts
- Understand and classify hot attacks are taking advantage of vulnerabilities
- Use common vulnerability assessment methodologies
- Understand threats against Internet of Things, real-operating systems, and cloud-based environments