Duration: 2 hours
When organizations are trying to secure their assets, knowledge equates to power. As businesses constantly increase their dependence on information technology -- including placing/migrating data to the cloud, IoT (internet of things) devices, mobile devices, social platforms, and others – their exposure to cyber risks continues to rise significantly. In this course, you will learn how to perform a vulnerability assessment; understand the tools and techniques available; and to compare and contrast vulnerability scanning and penetration testing.
Please note: Course notes are provided in PDF format for your convenience and can be downloaded to print or view on your device.