Critical Vulnerabilities and Exploits
17 courses
4 hours
Common Vulnerabilities and Exposures, or CVEs, are critical security vulnerabilities that have been discovered and publicly disclosed to initiate fixes/patches. Oftentimes it's hard to tell if a system is vulnerable or what to do next if it is. When a critical CVE breaks, we will have rapidly-released content to guide you and your team with what you need to know to protect your systems immediately.
In the section of hands-on labs, you will find common CVEs and walk through the steps of emulation, or discovering if a vulnerability is present, then covering how to detect and protect applications, services and software that has had a recent critical vulnerability with proof-of-concept exploitation released. These are vulnerabilities with the widest impact across all industries, and the information learned is focused on explaining exactly what you can do to protect your organization, and how to test those protections and detections.
Courses in this path
Critical Vulnerabilities and Exploits: What You Should Know
Common Vulnerabilities and Exposures, or CVEs, are critical security vulnerabilities that have been discovered and publicly disclosed to initiate fixes/patches. Oftentimes it's hard to tell if a system is vulnerable or what to do next if it is.
In this section, we cover critical, new vulnerabilities and exploits discovered - what they are, how to identify them in your environment and what risks are of concern to cybersecurity professionals.
CVE Emulation and Detection Hands-on Labs
In this section of hands-on labs, you will find common CVEs and walk through the steps of emulation, or discovering if a vulnerability is present, then covering how to detect and protect applications, services and software that has had a recent critical vulnerability with proof-of-concept exploitation released. These are vulnerabilities with the widest impact across all industries, and the information learned is focused on explaining exactly what you can do to protect your organization, and how to test those protections and detections.