In this event Randy will teach and demonstrate how to:
- Define and rate IT vulnerabilities.
- Understand testing and the reports that they return.
- Determine how bad your vulnerabilities are, and how to make them go away.
This course offers 2 training hours of content in role based security training. Download the ebook/participant guide and follow along.
Learning Objectives
- Satisfy Annual Role Based Security Training Requirements
- Enhance awareness of IT and/or cyber security issues, threats and solutions.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Threat Analysis
- Vulnerability Assessment and Management