This course has been discontinued
This course on Vulnerability Assessment is all about understanding the different systems and vulnerabilities and how they need to be considered in our security assessment. We cover architectural vulnerabilities and the many different types of systems you may have to deal. We also discuss vulnerabilities in general—those found in both systems and devices.
Upon completion of this course, the student will be able to:
• accurately and thoroughly assess vulnerabilities within a system or device, and he/she will be more familiar with the CISSP objectives 3.5, 3.6, 3.7, and 3.8
• have a better grasp of architectural vulnerabilities and will be able to address issues within both client-based and server-based servers from database systems to distributed systems as well as large-scale parallel systems and cryptographic systems
• address the vulnerability issues found in mobile devices and embedded and cyber-physical systems