This module focuses on understanding how weaknesses in systems, applications, and infrastructures translate into real-world security risks. Learners begin by examining Operating System Vulnerabilities, discovering how flaws or outdated components in Windows, Linux, or macOS can expose devices to attacks. The course then breaks down major Vulnerability Types.
A critical concept covered in this module is Zero-Day Vulnerabilities, which are flaws unknown to vendors and exploited before a patch exists. Students learn why these are highly dangerous and how attackers leverage them for stealthy, high-impact attacks.
The module also explores Misconfiguration Vulnerabilities, where security weaknesses arise not from coding errors but from improper system settings, open ports, weak permissions, or exposed cloud storage. Learners also study Sideloading, Rooting, and Jailbreaking, which involve bypassing device security controls to install unauthorized apps or gain elevated privileges—actions that drastically increase the attack surface.
The course then examines Application Vulnerabilities, focusing on weaknesses in software that attackers exploit to compromise data or systems. This includes an in-depth study of Web Application Attacks including cross-site scripting (XSS), SQL injection, cross-site request forgery (CSRF), and insecure session handling. Students also explore Cloud-Based Application Attacks, understanding how misconfigured cloud services, insecure APIs, and weak authentication expose organizations to breaches.
Modern threats often spread beyond direct system flaws, so the module covers Supply Chain Vulnerabilities, where attackers target vendors, code libraries, firmware, or third-party services to compromise a larger organization. This highlights the importance of trusted suppliers, code integrity, and continuous monitoring.
Learners are then introduced to proactive detection techniques, beginning with Vulnerability Scanning, where automated tools search systems for weaknesses.