Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
2403 results found. Sorted by relevance | date | title .
Results Page:  Previous Next

Title Cybersecurity threats and vulnerabilities : NICE framework work roles for K0005. [O'Reilly electronic resource]

Edition [First edition].
Publication Info. [Place of publication not identified] : O'Reilly Media, Inc., [2023]
QR Code
Description 1 online resource (1 video file (3 hr., 44 min.)) : sound, color.
Playing Time 034400
Description digital rdatr
video file rdaft
Instructional films lcgft
Performer Dean Bushmiller, presenter.
Summary This course will provide the foundational knowledge necessary to engage the vulnerability management team, support risk management, and collect data for risk assessments. Join expert Dean Bushmiller to learn the basis for scientifically defining and differentiating today's threats and vulnerabilities. Explore the best ways to identify and manage vulnerabilities using the CVE scoring system, the CAPEC system, the CWE system, and the MITRE ATT&CK matrix. What you'll learn and how you can apply it The components of vulnerabilities and threats and how to compare and contrast them The CVE vulnerability scoring system to prioritize actions The organization of the CAPEC system The root causes of hardware and software vulnerabilities Which vulnerability management system works with your environment How to interpret threat vulnerability reports and inform stakeholders This course is for you because: You're a professional looking to enter or advance in cybersecurity roles. You're a professional with cybersecurity as a component of your job description. You're a security analyst, vulnerability analyst, penetration tester, blue team technician, red team technician, network defense auditor, or risk assessor. Prerequisites: Equivalent knowledge of CompTIA Network+ certification Knowledge of the following: ports, protocols, services, OSI layers, routing, switching, IP addressing, wired and wireless networking infrastructure, network operations, and network troubleshooting tools. Recommended follow-up: Take Risk Management for Cybersecurity and IT Managers (video course with Jason Dion) Take System and Privacy Data Protection (video course with Aamir Lakhani).
Subject Computer networks -- Security measures.
Computer security.
Cyberterrorism.
Streaming video.
Réseaux d'ordinateurs -- Sécurité -- Mesures.
Sécurité informatique.
Cyberterrorisme.
Vidéo en continu.
streaming video.
Computer networks -- Security measures
Computer security
Cyberterrorism
Genre Instructional films
Internet videos
Nonfiction films
Instructional films.
Nonfiction films.
Internet videos.
Films de formation.
Films autres que de fiction.
Vidéos sur Internet.
Added Author Bushmiller, Dean, presenter.
O'Reilly (Firm), publisher.
Standard No. 0636920864325
Patron reviews: add a review
Click for more information
EVIDEO
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information