Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

CompTIA CySA+ (CS0-002) Cert Prep: 2 Vulnerability Management

Description

Review key vulnerability management tools and processes as you study for the CompTIA Cybersecurity Analyst (CySA+) exam. This course will prepare you for exam CS0-002.

Tags

Syllabus

Syllabus IntroductionVulnerability managementWhat you need to knowStudy resources1. Creating a Vulnerability Management ProgramWhat is vulnerability management?Identify scan targetsScan frequency2. Configuring and Executing Vulnerability ScansScan configurationScan perspectiveScanner maintenanceVulnerability scanning toolsPassive vulnerability scanning3. Remediating VulnerabilitiesReport scan resultsPrioritize remediationCreate a remediation workflowBarriers to vulnerability remediation4. Analyzing Scan ResultsSCAP (Security Content Automation Protocol)CVSS (Common Vulnerability Scoring System)Interpreting CVSS scoresAnalyzing scan reportsCorrelating scan results5. Common VulnerabilitiesServer vulnerabilitiesEndpoint vulnerabilitiesNetwork vulnerabilitiesVirutalization vulnerabilities6. Software Security IssuesOWASP (Open Web Application Security Project)Preventing SQL injectionUnderstanding cross-site scriptingPrivilege escalationDirectory traversalRace conditionsDereferencing NULL pointersThird-party codeInterception proxies7. Specialized Technology VulnerabilitiesIndustrial control systemsInternet of ThingsEmbedded systems8. Access Control VulnerabilitiesPassword attacksPassword spraying and credential stuffingImpersonation attacksSession hijackingEavesdropping attacksConclusionNext steps Read more


CompTIA CySA+ (CS0-002) Cert Prep: 2 Vulnerability Management

Affiliate notice

Review key vulnerability management tools and processes as you study for the CompTIA Cybersecurity Analyst (CySA+) exam. This course will prepare you for exam CS0-002.

Syllabus IntroductionVulnerability managementWhat you need to knowStudy resources1. Creating a Vulnerability Management ProgramWhat is vulnerability management?Identify scan targetsScan frequency2. Configuring and Executing Vulnerability ScansScan configurationScan perspectiveScanner maintenanceVulnerability scanning toolsPassive vulnerability scanning3. Remediating VulnerabilitiesReport scan resultsPrioritize remediationCreate a remediation workflowBarriers to vulnerability remediation4. Analyzing Scan ResultsSCAP (Security Content Automation Protocol)CVSS (Common Vulnerability Scoring System)Interpreting CVSS scoresAnalyzing scan reportsCorrelating scan results5. Common VulnerabilitiesServer vulnerabilitiesEndpoint vulnerabilitiesNetwork vulnerabilitiesVirutalization vulnerabilities6. Software Security IssuesOWASP (Open Web Application Security Project)Preventing SQL injectionUnderstanding cross-site scriptingPrivilege escalationDirectory traversalRace conditionsDereferencing NULL pointersThird-party codeInterception proxies7. Specialized Technology VulnerabilitiesIndustrial control systemsInternet of ThingsEmbedded systems8. Access Control VulnerabilitiesPassword attacksPassword spraying and credential stuffingImpersonation attacksSession hijackingEavesdropping attacksConclusionNext steps Read more