In the course you gained understanding of the threats, and where adversaries might commonly attack an enterprise:
•Summarize common vulnerability definitions
•Explain configuration weaknesses at the infrastructure level
•Identify insecure system settings that reduce security
•Describe the difficulties of keeping up with security patches
•List weaknesses that missing patches could introduce into enterprises
•Summarize attacker techniques