Computer Vulnerabilities

This course addresses the attacks and possible attack vectors that can be used to compromise network security and a student is given the necessary knowledge that is required to protect computer systems.

User Avatar
(0 review)

Network security is a complicated job, historically only it is a mandate of experienced and qualified experts that can deal with it.

Towards network security comes Vulnerability assessment of the key network assets for which security is ensured. However, as more and more people become agitated, there is a need for more lethargic people who can understand the basics of the network security world.

What you’ll learn

    • Identify risks involved in computing
    • Describe the goals of secure computing; confidentiality, integrity, and availability
    • Identify the threats to security in computing; interception, interruption, modification, and fabrication.
    • How to Analyse controls available to address threats

Requirements

    1. Basic knowledge of various Operating Systems such as Windows and Linux (Ubuntu and Kali).
    2. Students should have a basic background in IT Security.

Description

The course covers the basics of Vulnerability studies and understanding. It dives into detailed information on the critical issues of vulnerabilities and covers the basics of penetration testing vs vulnerability management as well. The course brings about the vulnerabilities and how they are aligned depending on the top 20 rated vulnerabilities by OWASP. The course also includes lab simulation of vulnerability management processes. The lab introduces the students to Nessus, Nikto, OpenVas and so many ways in which vulnerabilities are tracked in the security scanner based on the respective critical level.

Who this course is for:

    • New IT professionals
    • IT Administrators
    • IT Decision Makers
    • Entry- Seasoned IT Security Professionals

Course Curriculum

Total learning: 13 lessons / 2 quizzes Time: 4 weeks

ABOUT INSTRUCTOR

IFIS provides comprehensive and realistic business-critical Computer Based Training (CBT) solutions for those responsible for and/or considering a career in a typical heterogeneous computing environment.
Hello, my name is Peter. P Magemeso, and I am a security instructor at Institute of Forensics and ICT Security.

Reviews

Average Rating

0
0 rating

Detailed Rating

5 stars
0
4 stars
0
3 stars
0
2 stars
0
1 star
0