Common vulnerabilities and exposures (CVEs) describe publicly known cybersecurity vulnerabilities that affect software, hardware, and firmware. CVEs help security and IT professionals assess vulnerabilities to help make and keep computer systems more secure. In this course, explore some of the most common CVEs currently reported, like Ghostcat, PrintNightmare, and Polkit. Get valuable background information as well as a walkthrough of how to recognize and emulate the CVE in your environment. Check out this course to learn more about the latest vulnerabilities and exploits to reduce risk and keep adversaries out of your environment.
Note: This course was created by Cybrary. We are pleased to host this training in our library.
Learn More