Vulnerabilities in Information Assets

Loading...
Visualiser le programme de cours

Compétences que vous apprendrez

Security vulnerabilities and treatments, Threats to cybersecurity, Cybersecurity terminology, cybersecurity program elements

Avis

4.7 (201 évaluations)
  • 5 stars
    77.61%
  • 4 stars
    19.40%
  • 3 stars
    2.48%
  • 1 star
    0.49%
U
2 nov. 2020

this course covers the foundations of cybersecurity, including threats and vulnerabilities as well as the tools, technologies, and strategies used to manage it.

JV
3 déc. 2020

Great intro to what cyber security is. The talking was quite robotic but its was presented in an understandable way. This course is a great starting point.

À partir de la leçon
Managing Vulnerabilities in Information Assets (Module 1.4)
Learning objectives for Managing Vulnerabilities in Information Assets module

Enseigné par

  • Placeholder

    Herbert J. Mattord, Ph.D., CISM, CISSP, CDP

    Professor of Information Security
  • Placeholder

    Michael Whitman, Ph.D., CISM, CISSP

    Professor of Information Security

Explorer notre catalogue

Rejoignez-nous gratuitement et obtenez des recommendations, des mises à jour et des offres personnalisées.