DARRA BROWN
14. VULNERABILITY MANAGEMENT
14.1 Functions- Vulnerability Assessment Functions, Base and NOS Roles
14.2 Base Roles- Vulnerability Assessment Functions, Base and NOS Roles
14.3 NOS Roles- Vulnerability Assessment Functions, Base and NOS Roles
14.4 Describe Assessment and Authorizations Requirements- Cybersecurity Assessment & Auth, DoDI 85101.01 - RMF f/DODEA Info Tech, DoDI 8500.01 - Cybersecurity
14.5 Functions and Capabilities of ACAS- ACAS
14.6 Review a Vulnerability Scan- Review Vulnerability Scan
14.7 Identify Most Vulnerable Systems- Vulnerability Assessment Functions, Base & NOS Roles
14.8 Vulnerability Remediation- Vulnerability Remediation
14.9 STIG- Security Content Automation Protocol (SCAP) DoD Cyber Exchange
14.10 Endpoint Security- Training and Resources and Endpoint Security
14.10.1 Endpoint Security Monitoring- Monitoring & Securing System Configuration
14.10.2 Endpoint Security Analysis- End Point Security, End Point Security Best Practices, &
The Complete Cyber Security Course : End Point Protection! (Threat Detection and Monitoring: Network Analysis - Sguil, Xplico & NetworkMiner)
https://digitalu.udemy.com/course/the-complete-cyber-security-course-end-point-protection/
(Requires digitalu access)
14.10.3 Endpoint Security Remediation- The Complete Cyber Security Course : End Point Protection! (Malware adn Hacker Hunting on the End-Point)
https://digitalu.udemy.com/course/the-complete-cyber-security-course-end-point-protection/
(Requires digitalu access)
14.10.4 Endpoint Security Reporting- Cyber Security Reporting &
Microsoft Endpoint Manager Training with Complete Concepts
https://digitalu.udemy.com/course/sccm-training/
(Requires digitalu access)
SCCM Reporting Service - Enable Configure And View Run Reports
14.11 Standard Desktop Configuration
14.11.1 SDC Build Limitations - Windows 10 Deployment Tools & Deploy Windows Server
Issued on
November 30, 2023
Expires on
Does not expire