Duration: 2 hours
When organizations are trying to secure their assets, knowledge equates to power. As businesses constantly increase their dependence on information technology -- including placing/migrating data to the cloud, IoT (internet of things) devices, mobile devices, social platforms, and others – their exposure to cyber risks continues to rise significantly. In this course, you will learn how to perform a vulnerability assessment; understand the tools and techniques available; and to compare and contrast vulnerability scanning and penetration testing.
1 Lesson