Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Udacity

Threats, Vulnerabilities, and Incident Response

via Udacity

Overview

Build the expertise to handle real-world cyber incidents. Identify threats, analyze vulnerabilities, and apply structured response procedures to minimize damage and recover quickly from security breaches.

Syllabus

  • Intro to Threats, Vulnerabilities, and Incident Response
    • Meet your instructor, discuss what you'll learn in this course, major stakeholders and a brief history, and a peek at the final project!

  • Assessing Threats
    • This lesson will cover threats and vulnerabilities, attack types, threat motivations, threats to organizations, and threat responses.
  • Finding Security Vulnerabilities
    • In this lesson, we'll be discussing attack methods, scanning for vulnerabilities, and penetration testing.
  • Fixing Security Vulnerabilities
    • We're going to cover how to conduct vulnerability research, test and apply results, and how to prioritize and strategize the results in this lesson.
  • Preparing for Inevitable Attacks
    • Finally, we're going to cover incidents and recovery, events and incidents, the response lifecycle, and roles and response plans.
  • Navigating a Cybersecurity Incident
    • During the project, you'll summarize and profile a cyber threat, conduct a vulnerability scan, research, analyze and prioritize vulnerabilities, and finally - document incident response actions.

Taught by

Christine Izuakor, PhD, CISSP

Reviews

5 rating at Udacity based on 1 rating

Start your review of Threats, Vulnerabilities, and Incident Response

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.