Skip to Main Content

PLP Minor in Cybersecurity: LU2_Week 3

Banner

Online Articles

Note: Refer to MHE Lecture 3- Information Security Threats and Vulnerability Assessment: Slide 21

 

Note: Refer to MHE Lecture 3- Information Security Threats and Vulnerability Assessment: Slide 27

 

Rootkit scan

Note: Refer to MHE Lecture 3- Information Security Threats and Vulnerability Assessment: Slide 32

 

icon

Note: Refer to MHE Lecture 3- Information Security Threats and Vulnerability Assessment: Slide 54

 

Note: Refer to MHE Lecture 3- Information Security Threats and Vulnerability Assessment: Slide 58

 

a computer tower with a blue background

Note: Refer to MHE Lecture 3- Information Security Threats and Vulnerability Assessment: Slide 65

 

Image of Severity

Note: Refer to MHE Lecture 3- Information Security Threats and Vulnerability Assessment: Slide 75

LinkedIn Learning

Note: Refer to MHE Lecture 3- Information Security Threats and Vulnerability Assessment: Slide 72

eBook

Note: Refer to MHE Lecture 3- Information Security Threats and Vulnerability Assessment: Slide 27

Videos

Note: Refer to MHE Lecture 3- Information Security Threats and Vulnerability Assessment: Slide 31

 

Note: Refer to MHE Lecture 3- Information Security Threats and Vulnerability Assessment: Slide 40

 

Note: Refer to MHE Lecture 3- Information Security Threats and Vulnerability Assessment: Slide 62

 

What Is Ethical Hacking? | Ethical Hacking In 8 Minutes | Ethical Hacking  Explanation | Simplilearn - YouTube

Note: Refer to MHE Lecture 3- Information Security Threats and Vulnerability Assessment: Slide 66

 

GFI LanGuard Review: Top Features, Pros, And Cons - YouTube

Note: Refer to MHE Lecture 3- Information Security Threats and Vulnerability Assessment: Slide 74

Infographics

Note: Refer to MHE Lecture 3- Information Security Threats and Vulnerability Assessment: Slide 12

 

Stages of a Fileless Malware Attack

Note: Refer to MHE Lecture 3- Information Security Threats and Vulnerability Assessment: Slide 43