Vulnerability Detection and Remediation

Length: 00:16:22

Lesson Summary:

Subsequent to our discussion of scanning, this lesson covers the response to the findings of scanning practice. Once vulnerabilities become known, security policy is used to determine appropriate remediation. This lesson will discuss comon vulnerabilities and why it is necessary to tolerate malware in many systems. Typical approaches to remediation is also covered.


This lesson is only available to Linux Academy members.

Sign Up To View This Lesson
Or Log In

Looking For Team Training?

Learn More