Cargando…

Cybersecurity threats and vulnerabilities : NICE framework work roles for K0005.

This course will provide the foundational knowledge necessary to engage the vulnerability management team, support risk management, and collect data for risk assessments. Join expert Dean Bushmiller to learn the basis for scientifically defining and differentiating today's threats and vulnerabi...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : O'Reilly Media, Inc., [2023]
Edición:[First edition].
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a22000007i 4500
001 OR_on1402231459
003 OCoLC
005 20231017213018.0
006 m o c
007 vz czazuu
007 cr cnannnuuuuu
008 231011s2023 xx 224 o vleng d
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA  |d ORMDA 
024 8 |a 0636920864325 
035 |a (OCoLC)1402231459 
037 |a 0636920864325  |b O'Reilly Media 
050 4 |a TK5105.59 
082 0 4 |a 005.8  |2 23/eng/20231011 
049 |a UAMI 
245 0 0 |a Cybersecurity threats and vulnerabilities :  |b NICE framework work roles for K0005. 
250 |a [First edition]. 
264 1 |a [Place of publication not identified] :  |b O'Reilly Media, Inc.,  |c [2023] 
300 |a 1 online resource (1 video file (3 hr., 44 min.)) :  |b sound, color. 
306 |a 034400 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
344 |a digital  |2 rdatr 
347 |a video file  |2 rdaft 
380 |a Instructional films  |2 lcgft 
511 0 |a Dean Bushmiller, presenter. 
520 |a This course will provide the foundational knowledge necessary to engage the vulnerability management team, support risk management, and collect data for risk assessments. Join expert Dean Bushmiller to learn the basis for scientifically defining and differentiating today's threats and vulnerabilities. Explore the best ways to identify and manage vulnerabilities using the CVE scoring system, the CAPEC system, the CWE system, and the MITRE ATT&CK matrix. What you'll learn and how you can apply it The components of vulnerabilities and threats and how to compare and contrast them The CVE vulnerability scoring system to prioritize actions The organization of the CAPEC system The root causes of hardware and software vulnerabilities Which vulnerability management system works with your environment How to interpret threat vulnerability reports and inform stakeholders This course is for you because: You're a professional looking to enter or advance in cybersecurity roles. You're a professional with cybersecurity as a component of your job description. You're a security analyst, vulnerability analyst, penetration tester, blue team technician, red team technician, network defense auditor, or risk assessor. Prerequisites: Equivalent knowledge of CompTIA Network+ certification Knowledge of the following: ports, protocols, services, OSI layers, routing, switching, IP addressing, wired and wireless networking infrastructure, network operations, and network troubleshooting tools. Recommended follow-up: Take Risk Management for Cybersecurity and IT Managers (video course with Jason Dion) Take System and Privacy Data Protection (video course with Aamir Lakhani). 
588 |a Online resource; title from title details screen (O'Reilly, viewed October 11, 2023). 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 0 |a Cyberterrorism. 
655 7 |a Instructional films.  |2 lcgft 
655 7 |a Nonfiction films.  |2 lcgft 
655 7 |a Internet videos.  |2 lcgft 
700 1 |a Bushmiller, Dean,  |e presenter. 
710 2 |a O'Reilly (Firm),  |e publisher. 
856 4 0 |u https://learning.oreilly.com/videos/~/0636920864325/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP