Handling Vulnerabilities

Before you focus on specific vulnerabilities and tactics for dealing with them, there are some general strategies that you can employ to prevent vulnerabilities from creeping into your software.

14 videos  //  143 minutes of training

Free training week — 1,400+ on-demand courses and hands-on labs

Course description

In this course, you will handle vulnerabilities due to software defects and misconfiguration, handle vulnerabilities due to human factors, and handle vulnerabilities due to shortcomings in software development and deployment processes.

Course syllabus

Handle Vulnerabilities Due to Software Defects and MisconfigurationDuration: 13:01

Handle Vulnerabilities Due to Software Defects and Misconfiguration, Part 2Duration: 11:49

Handle Vulnerabilities Due to Software Defects and Misconfiguration, Part 3Duration: 7:42

Activity: Examining the Web App FunctionalityDuration: 14:52

Activity: Examining the Project Files for Security ConcernsDuration: 14:42

Handle Error MessagingDuration: 11:37

Activity: Identifying Software Defects and MisconfigurationDuration: 9:42

Handle Vulnerabilities Due to Human FactorsDuration: 12:56

Handle Vulnerabilities Due to Human Factors, Part 2Duration: 6:21

Activity: Managing People RisksDuration: 9:28

Handle Vulnerabilities Due to Process ShortcomingsDuration: 10:08

Handle Vulnerabilities Due to Process Shortcomings, Part 2Duration: 4:59

Handle Vulnerabilities Due to Process Shortcomings, Part 3Duration: 10:27

Activity: Managing Software Development Process RisksDuration: 5:00

Meet the author

Chrys Thorsen

LinkedIn

Chrys Thorsen is a technology and education consultant with 25 years of experience. Her work has taken her around the U.S. and overseas, including as a contractor for the CDC using technology to help fight HIV/AIDS in Africa. During her career, she has acquired 40 IT certifications, authored over 25 textbooks on a wide range of IT subjects, including secure iOS and Android coding, and created an equal number of IT-related video courses. When not working, Chrys enjoys reading scientific articles and experimenting with Internet-of-Things devices. She currently lives in Virginia with her sister, her cat and her dog which, as she describes it, "have the worst sibling rivalry imaginable."

Plans & pricing

Infosec Skills Personal

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

Book a Meeting
  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Award-winning training that you can trust

IDC MarketScape Leader: U.S. IT Training

IDC MarketScape Leader: U.S. IT Training

Infosec Skills

eLearning Content

eLearning Content

Infosec Skills

Best Product - Cybersecurity Training for Infosec Professionals

Best Product - Cybersecurity Training for Infosec Professionals

Infosec Skills

Security Education & Platform

Security Education & Platform

Infosec Skills

Ranked #52 in Top 100 Global Software Sellers

Ranked #52 in Top 100 Global Software Sellers

Infosec