Course Overview
1.0: Threats, Attacks, and Vulnerabilities
Section 1.0: Test Your Knowledge
Section 1.0: Identifying Scenario & Questions
2.0: Technologies and Tools
Section 2.0: Test Your Knowledge
Section 2.0: Identifying Scenario & Questions
3.0: Architecture and Design
1 of 3

1.5.3 Identify lack of security controls

TERM

DEFINITION

LAYMAN'S TERM

Identify Lack of Security Controls

Vulnerability scanning that looks for lack of firewalls and secure passwords antivirus, anti-spyware, etc.

Vulnerability scans are done to see how a system is weak to threats.

We Don't Want You TO GO!

Try a couple of our sample lessons. This is our gift to you!

Take A Jab At It!

Test Your Skills
Free Today!

If you don’t do well on this FREE quiz we just ask you come back and let us help you learn and gain your Certification.