Intro to Information Security Threats

In this session, we will explore the relationship between vulnerabilities, threats, and exploits. We will learn how attacks against systems occur, and how Security teams can defend against these threats. We will also learn to read vulnerability reports to assess risk to potentially vulnerable systems. We will then use this knowledge to examine the growing risk of running Internet of Things and common applications on the internet, and how to better secure these applications.

Alexander Merck | Analyst IT

This class will be hosted via Zoom. You will receive an email with the Zoom link a day before the class. Attendance will be taken and the session will be recorded

About Course


  • Difference between vulnerabilities, threats, risk, and exploits
  • How do attacks against systems occur?
  • Common defense tools and techniques for mitigating risk to a network
  • How to read and understand a vulnerability report
  • Methods for protecting your systems

This class is part of our Systems & Security Track

See the whole track

Suggested Courses

Course Graphic

Detecting and Preventing Security Threats

Come to this workshop to explore methods to detect and prevent common attacks against networked devices

Learn More
Course Graphic

Ethical Hacking and Practical Pentesting

Learn about common techniques used by attackers to identify vulnerable systems on a network, and methods used to compromise these systems.

Learn More