Search result for Vulnerability mitigation Online Courses & Certifications
Get Course Alerts by Email
Cybersecurity Risk Management
by Tong Sun- 0.0
8 Weeks
Learn key principles of risk analysis, risk assessment and risk mitigation for information security using both qualitative and quantitative methodologies....
$249
Cyber Security - Python and Web Applications
by Mashrur Hossain- 0.0
10.5 hours on-demand video
Vulnerability Analysis Web Application Vulnerability Mitigation...
$16.99
Introduction to Climate Change and Health
by Robert Dubrow- 4.8
Approx. 15 hours to complete
· Explain how adaptation and mitigation strategies can reduce adverse health impacts of climate change and can generate substantial non-climate health benefits in a just and equitable manner. Vulnerability Determinants of Vulnerability Immediate Health Benefits of Climate Change Mitigation Determinants of Vulnerability To Heat Stress Health effects of coastal storms and flooding in urban areas: a review and vulnerability assessment...
Website Hacking / Penetration Testing & Bug Bounty Hunting
by Zaid Sabih- 4.6
10 hours on-demand video
File upload - This vulnerability allow attackers to upload executable files on the target web server, exploiting these vulnerabilities properly gives you full control over the target website. Remote File Inclusion - This vulnerability can be used to load remote files, exploiting this vulnerability properly gives you full control over the target web server....
$19.99
From Climate Science to Action
by Alan S. Miller , Claudia Barrera- 4.7
Approx. 15 hours to complete
• Region-specific discussions on mitigation actions needed to reduce emissions while decreasing vulnerability to climate change impacts through adaptation and by building climate resilience Mitigation in East Asia and Pacific Mitigation in Sub-Saharan Africa Mitigation in Europe and Central Asia Mitigation in the Middle East and North Africa Mitigation in Latin America and Caribbean...
Unlocking Information Security I: From Cryptography to Buffer Overflows
by Avishai Wool , Dan Gittik- 0.0
5 Weeks
Finally, you will learn about the most critical vulnerability of all times - Buffer Overflow. An overview of the most critical vulnerability of all times - buffer overflow, including common variants like Variable and Stack Overflow and simple yet effective mitigation techniques like canaries and DEP...
$149
Become Zero to hero in Risk Management Fundamentals
by Varinder K- 4.8
2 hours on-demand video
What is Vulnerability ? Section 7 discusses about Risk Mitigation - Part 03 Deep Dive and you will learn below concepts: What is Risk Reduction or Mitigation...
$11.99
Related searches
Planning for Climate Change in African Cities
by Veronica Olivotto , Dr. Shuaib Lwasa , Prof. Andy Gouldson , Marcus Mayr , Dr. Stelios Grafakos , Dr. David Dodman , Dr. Diana Reckien , Dr. Nathalie Jean Baptiste- 4.8
Approx. 22 hours to complete
• Understand the drivers of urban risk and vulnerability in the context of climate change Defining and Assessing Urban Risk and Vulnerability Introduction to Defining Risk and Vulnerability Approaches to Climate Change Vulnerability Practical Examples of Calculating Social Vulnerability Risk and Vulnerability in African Cities Reading Materials for Video 5"Risk and Vulnerability in African Cities"...
TOTAL: CompTIA CySA+ Cybersecurity Analyst (CS0-002)
by Total Seminars • 750,000+ Enrollments- 4.6
11.5 hours on-demand video
Threat and Vulnerability Management (22% of the exam) Vulnerability management with mobile, IoT, the cloud, and more Business impact analysis and organizational risk mitigation...
$20.99
CISSP Certification: Domains 5, 6, 7 & 8 Video Training-2020
by Shon Gerber- 0.0
6.5 hours on-demand video
Vulnerability Assessment Mitigation Implement and Support Patch and Vulnerability Management Vulnerability Assessment Enable a Vulnerability Management Program before you have vulnerability issues....
$12.99