This course was created with the
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
IT Security Gumbo-Vulnerability Management Analysis
1.THE SECURITY TEST PHASE
1.Types of Vulnerabilities (4:48)
2.Remediation (5:31)
3.Mitigation (5:02)
4.Discovery (5:10)
5.Security Testing (4:55)
6.Security Test Part 2 (4:51)
7.Security Testing Approach (4:58)
8.Reports (4:48)
9.Priorities (4:25)
2.NETWORK VULNERABILITIES
1.TCP-IP-Vulnerabilities-89dB _1_ (5:49)
2.ICMP-Vulnerabilities-89dB _2_ (4:56)
3.UDP-Vulnerabilities-89dB _3_ (6:54)
4.Wireshark Translation-89dB _4_ (4:27)
3.VULNERABILITY ANALYZING
1.Cryptography (19:46)
2.Security Data Analysis (22:46)
3.Wireshark (8:12)
4.Wireshark Translation-89dB _4_
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock