Vulnerabilities in Information Assets

Visualiser le programme de cours

Compétences que vous apprendrez

Security vulnerabilities and treatments, Threats to cybersecurity, Cybersecurity terminology, cybersecurity program elements


4.7 (201 évaluations)
  • 5 stars
  • 4 stars
  • 3 stars
  • 1 star
2 nov. 2020

this course covers the foundations of cybersecurity, including threats and vulnerabilities as well as the tools, technologies, and strategies used to manage it.

3 déc. 2020

Great intro to what cyber security is. The talking was quite robotic but its was presented in an understandable way. This course is a great starting point.

À partir de la leçon
Managing Vulnerabilities in Information Assets (Module 1.4)
Learning objectives for Managing Vulnerabilities in Information Assets module

Enseigné par

  • Placeholder

    Herbert J. Mattord, Ph.D., CISM, CISSP, CDP

    Professor of Information Security
  • Placeholder

    Michael Whitman, Ph.D., CISM, CISSP

    Professor of Information Security

Explorer notre catalogue

Rejoignez-nous gratuitement et obtenez des recommendations, des mises à jour et des offres personnalisées.