MDX1218 - Threats and Vulnerabilities Scenarios
Course Description
Course Description
This course examines the process of identifying and mitigating threats and vulnerabilities in information systems. It covers common categories of threats and vulnerabilities and the resources used to detect them. This course also features a number of fictional scenarios based on threats and vulnerabilities. This course is designed for IT professionals and other adult learners who are interested in information technology security, with an eye towards handling real world scenarios.
Learning Outcomes
- Discuss the role of governance and auditing in identifying threats and vulnerabilities
- Identify common vulnerabilities and how penetration testing and other methods can reveal them
- Explain how threats and vulnerabilities factor into risk analysis and lead to differing risk management strategies
- Describe the difference between quantitative and qualitative risk analysis
- Evaluate different security controls such as firewalls, IDS, IPS, antimalware and patch management
- Identify common threats and other attacks on networks and their hosts
- Respond appropriately to threats and vulnerabilities raised in real-world scenarios
Key Features
- Expert-supported
- Mobile-friendly
- Accessible
- Badge and credit-awarding
- Games & Flashcards
- Video content
- Real-world case studies
- Audio-enabled in app
Refund Policy
You may request a refund up to 5 days from the purchase date. The registration fee will only be refunded if less than 10% of the course has been completed. Completion percentage can be viewed on the Course Progress page from within the course.
Notes
This course has an "Ask the Expert" feature, which submits your questions directly to an expert in the field you are studying. Questions are answered as quickly as possible and usually within 24 hours.
This course does not require any additional purchases of supplementary materials.
Learners must achieve an average test score of at least 70% to meet the minimum successful completion requirement and qualify to receive IACET CEUs. Learners will have three attempts at all graded assessments.
Project Management Institute, PMI, the Registered Education Provider logo, Project Management Professional, PMP, Project Management Body of Knowledge, PMBOK, PMI Agile Certified Practitioner, PMI-ACP, PMI Risk Management Professional, PMI-RMP, the PMI Talent Triangle, and the PMI Talent Triangle logo are marks of the Project Management Institute, Inc.
Information in this course has been taken from A Guide to the Project Management Body of Knowledge, (PMBOK® Guide) — Sixth Edition, Project Management Institute Inc., 2017.
The following list outlines the PDUs you will earn for completing this course, based on the certification you have.
- PMP®/PgMP®
- Technical: 3.5
- Leadership: 0
- Strategic/Business: 1.5
- TOTAL: 5
- PMI-RMP®
- Technical: 3.5
- Leadership: 0
- Strategic/Business: 1.5
- TOTAL: 5
- PMI-SP®
- Technical: 0
- Leadership: 0
- Strategic/Business: 1.5
- TOTAL: 1.5
- PMI-ACP®
- Technical: 3.5
- Leadership: 0
- Strategic/Business: 1.5
- TOTAL: 5
- PfMP®
- Technical: 0
- Leadership: 0
- Strategic/Business: 1.5
- TOTAL: 1.5
- PMI-PBA®
- Technical: 0
- Leadership: 0
- Strategic/Business: 1.5
- TOTAL: 1.5
Applies Towards the Following Certificates
- Real-World Cybersecurity Scenarios : Real-World Cybersecurity Scenarios