|
|
|
|
LEADER |
00000cgm a22000007i 4500 |
001 |
OR_on1402231459 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
vz czazuu |
007 |
cr cnannnuuuuu |
008 |
231011s2023 xx 224 o vleng d |
040 |
|
|
|a ORMDA
|b eng
|e rda
|e pn
|c ORMDA
|d ORMDA
|
024 |
8 |
|
|a 0636920864325
|
035 |
|
|
|a (OCoLC)1402231459
|
037 |
|
|
|a 0636920864325
|b O'Reilly Media
|
050 |
|
4 |
|a TK5105.59
|
082 |
0 |
4 |
|a 005.8
|2 23/eng/20231011
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Cybersecurity threats and vulnerabilities :
|b NICE framework work roles for K0005.
|
250 |
|
|
|a [First edition].
|
264 |
|
1 |
|a [Place of publication not identified] :
|b O'Reilly Media, Inc.,
|c [2023]
|
300 |
|
|
|a 1 online resource (1 video file (3 hr., 44 min.)) :
|b sound, color.
|
306 |
|
|
|a 034400
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
344 |
|
|
|a digital
|2 rdatr
|
347 |
|
|
|a video file
|2 rdaft
|
380 |
|
|
|a Instructional films
|2 lcgft
|
511 |
0 |
|
|a Dean Bushmiller, presenter.
|
520 |
|
|
|a This course will provide the foundational knowledge necessary to engage the vulnerability management team, support risk management, and collect data for risk assessments. Join expert Dean Bushmiller to learn the basis for scientifically defining and differentiating today's threats and vulnerabilities. Explore the best ways to identify and manage vulnerabilities using the CVE scoring system, the CAPEC system, the CWE system, and the MITRE ATT&CK matrix. What you'll learn and how you can apply it The components of vulnerabilities and threats and how to compare and contrast them The CVE vulnerability scoring system to prioritize actions The organization of the CAPEC system The root causes of hardware and software vulnerabilities Which vulnerability management system works with your environment How to interpret threat vulnerability reports and inform stakeholders This course is for you because: You're a professional looking to enter or advance in cybersecurity roles. You're a professional with cybersecurity as a component of your job description. You're a security analyst, vulnerability analyst, penetration tester, blue team technician, red team technician, network defense auditor, or risk assessor. Prerequisites: Equivalent knowledge of CompTIA Network+ certification Knowledge of the following: ports, protocols, services, OSI layers, routing, switching, IP addressing, wired and wireless networking infrastructure, network operations, and network troubleshooting tools. Recommended follow-up: Take Risk Management for Cybersecurity and IT Managers (video course with Jason Dion) Take System and Privacy Data Protection (video course with Aamir Lakhani).
|
588 |
|
|
|a Online resource; title from title details screen (O'Reilly, viewed October 11, 2023).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Cyberterrorism.
|
655 |
|
7 |
|a Instructional films.
|2 lcgft
|
655 |
|
7 |
|a Nonfiction films.
|2 lcgft
|
655 |
|
7 |
|a Internet videos.
|2 lcgft
|
700 |
1 |
|
|a Bushmiller, Dean,
|e presenter.
|
710 |
2 |
|
|a O'Reilly (Firm),
|e publisher.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/0636920864325/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|