Course Detail
Units:
3.0
Course Components:
Lecture
Description
Proactively managing vulnerabilities in information technology is essential to reducing the risk of data being compromised. This course first reviews the tactics, techniques, and procedures that attackers use to exploit vulnerabilities. The course then discusses strategies for eliminating vulnerabilities and techniques for deploying safeguards to reduce the risk of inherent vulnerabilities.