This course examines the process of identifying and mitigating threats and vulnerabilities in information systems. It covers common categories of threats and vulnerabilities and the resources used to detect them. This course also features a number of fictional scenarios based on threats and vulnerabilities. This course is designed for IT professionals and other adult learners who are interested in information technology security, with an eye towards handling real-world scenarios.
Follow this link to register: https://catalog.mindedge.com/rsu19/courses/1218/threats-and-vulnerabilities-scenarios
Enter code RSU19 at checkout for a limited time discount!