Threats and Vulnerabilities Scenarios (DTV01)
This course examines the process of identifying and mitigating threats and vulnerabilities in information systems. It covers common categories of threats and vulnerabilities and the resources used to detect them. This course also features a number of fictional scenarios based on threats and vulnerabilities. This course is designed for IT professionals and other adult learners who are interested in information technology security, with an eye towards handling real world scenarios.
Estimated length: 5 hrs
Access Time: 90 days
Our online courses allow you to invest in your career and personal interests anytime and anywhere. Courses are either stand-alone or may belong to a certificate. Please see the certificate section for more information. Access time to the course is listed above. If you require longer, you can request an extension; however, please note that doing so will incur additional fees. To request an extension, please contact the Continuing Education department at firstname.lastname@example.org, or 780-539-2975.
You may request a refund up to 5 days from the purchase date. The registration fee will only be refunded if less than 10% of the course has been completed. Completion percentage can be viewed on the Course Progress page from within the course.