| Week 3 38 pages and 30 multiple choice questions | |||||||
|---|---|---|---|---|---|---|---|
| Read Chapters 4, 5, and 6 again | |||||||
| Chapter 7 – Explain various types of vulnerabilities – 15 pages
Chapter 8 – Given a scenario, analzye indicators of malicous activity – 22 pages Chapter 9 – Explain the purpose of mitigation techniques used to secure the enterprise – 11 pages
|
|||||||
| Action – Ian’s Book | Key Elements | ||||||
|
Application vulnerabilities
Operating system – based attacks Web-based attacks Hardware attacks Virtualization Cloud specific attacks Supply chain attacks Cryptographic attacks Mobile device attacks Zero-day attacks Malware attacks Physical attacks Network attacks Application attacks Password attacks Attack Indicators Segmentation/Isolation Access Control Application Allow list Patching Monitoring Least privilege Configuration enforcement Decommissioning Hardening Techniques
|
||||||