18. Lesson Conclusion
Lesson Conclusion
ND545 C1 L5 16 Lesson Conclusion

Summary
This lesson explained the different ways to establish and maintain the security of a network, computing environment, and application. It’s the final step for applying cybersecurity on organizational computer systems. In this lesson, you learned about identifying existing assets and devices on your network, analyzing those assets for vulnerabilities and threats that could harm them and finished with how to recommend and apply some basic security controls
Lesson learning objective
- Categorize assets, risks, threats, vulnerabilities, exploits
- Identify the organizational asset(s)
- Analyze vulnerabilities and risks to those organizational assets
- Recommend and apply basic security controls