Studyportals
Certificate Online

Threats, Vulnerabilities, and Incident Response Udacity

Highlights
Tuition fee
Unknown
Tuition fee
Unknown
Duration
2 days
Duration
2 days
Apply date
Anytime
Unknown
Apply date
Anytime
Unknown
Start date
Anytime
Unknown
Start date
Anytime
Unknown
Taught in
English
Taught in
English

About

Throughout this Threats, Vulnerabilities, and Incident Response course from Udacity you'll learn that cybersecurity breaches happen when a threat is able to successfully exploit a vulnerability within a business.

Overview

The Threats, Vulnerabilities, and Incident Response course if offered by Udacity.

Key facts:

To avoid these attacks, security professionals must understand the threats the company is facing, including the various threat actors and their motivations.

  • Security professionals must also be able to find vulnerabilities that can enable threats to attack through common practices such as vulnerability scanning and penetration testing. 
  • Finally, security professionals should be able to activate and follow incident response procedures to address cybersecurity incidents and breaches. 
  • Ultimately, during this course, students will learn how to identify security threats and gaps, fix issues, and respond to inevitable attacks.

Programme Structure

Courses include:

  • Assessing Threats
  • Finding Security Vulnerabilities
  • Fixing Security Vulnerabilities
  • Preparing for Inevitable Attacks
  • Project: Navigating a Cybersecurity Incident

Key information

Duration

  • Part-time
    • 2 days

Start dates & application deadlines

You can apply for and start this programme anytime.

Language

English

Delivered

Online

Campus Location

  • Mountain View, United States

What students do after studying

Join for free or log in to access our complete career info list.

Academic requirements

We are not aware of any specific GRE, GMAT or GPA grading score requirements for this programme.

English requirements

We are not aware of any English requirements for this programme.

Other requirements

General requirements

Prior to enrolling, you should have the following knowledge:

  • Cybersecurity fluency
  • Command line interface basics
  • Computer networking basics
  • Operating system fundamentals

You will also need to be able to communicate fluently and professionally in written and spoken English.

Tuition Fees

Additional Details

  • This program can be paid for with the Udacity subscription.

Funding

Other interesting programmes for you

Our partners

Threats, Vulnerabilities, and Incident Response
Udacity
Threats, Vulnerabilities, and Incident Response
-
Udacity

Wishlist

Go to your profile page to get personalised recommendations!