Security Vulnerabilities: Managing Threats & Vulnerabilities


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

This 14-video course helps learners explore the threat categories in the STRIDE (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege) model for identifying computer security threats, including spoofing, tampering, repudiation, information disclosure, denial of service (DoS), and escalation of privilege. Key concepts covered in this course include categories of security vulnerabilities using the STRIDE model; how to recognize authenticity and identity spoofing threats; and how to validate integrity and tampering threats. Next, you will learn about authentication threats and non-repudiation, when used in security, for example, when a charge cannot be challenged; learn information threats such as privacy breaches or data leaks; and learn the threat of DoS attacks, a resource disruption attack when a user tries to connect. Learners continue by exploring the privilege escalation threat model; learning to recognize examples of security misconfiguration threats; and observing methods of brute force attacks and key sizes. Finally, learn to perform a local network scan and a targeted remote scan by using Nmap; and learn to perform a DoS vulnerability diagnostic test on a host.



Expected Duration (hours)
0.9

Lesson Objectives

Security Vulnerabilities: Managing Threats & Vulnerabilities

  • discover the key concepts covered in this course
  • describe the categories of vulnerabilities using the STRIDE model
  • describe authenticity and identity spoofing threats
  • describe how to validate integrity and tampering threats
  • describe authentication threats and non-repudiation
  • describe information threats such as privacy breaches or data leaks
  • describe the threat of denial of service attacks
  • describe the privilege escalation threat model
  • recognize examples of security misconfiguration threats
  • describe methods of brute force attacks and key sizes
  • perform a local network scan using Nmap
  • perform a targeted remote scan using Nmap
  • perform a DOS vulnerability diagnostic test on a host
  • summarize the key concepts covered in this course
  • Course Number:
    it_savatsdj_01_enus

    Expertise Level
    Beginner