18. Lesson Conclusion

Lesson Conclusion

ND545 C1 L5 16 Lesson Conclusion

Summary

This lesson explained the different ways to establish and maintain the security of a network, computing environment, and application. It’s the final step for applying cybersecurity on organizational computer systems. In this lesson, you learned about identifying existing assets and devices on your network, analyzing those assets for vulnerabilities and threats that could harm them and finished with how to recommend and apply some basic security controls

Lesson learning objective

  • Categorize assets, risks, threats, vulnerabilities, exploits
  • Identify the organizational asset(s)
  • Analyze vulnerabilities and risks to those organizational assets
  • Recommend and apply basic security controls