Vulnerability Assessment Training: Protecting Your Organization

Level: Intermediate
RATING: 4.7/5 4.73/5 Based on 176 Reviews

In this Vulnerability Assessment training course, you learn how to create a network security vulnerability assessment checklist by exposing infrastructure, server, and desktop vulnerabilities, create and interpret reports, configure vulnerability scanners, detect points of exposure, and ultimately prevent network exploitation.

To minimize costly security breaches, organizations need to evaluate the risk in their enterprise from an array of vulnerabilities. Attend this 4-day course and learn to minimize your organization's exposure to security breaches.

Key Features of this Vulnerability Assessment Training:

  • After-course instructor coaching benefit
  • Learning Tree end-of-course exam included

You Will Learn How To:

  • Detect and respond to vulnerabilities, and minimize exposure to security breaches
  • Employ real-world exploits and evaluate their effect on your systems
  • Configure vulnerability scanners to identify weaknesses
  • Analyze the results of vulnerability scans
  • Establish an efficient strategy for vulnerability management

Certifications/Credits:

CompTIA

Choose the Training Solution That Best Fits Your Individual Needs or Organizational Goals

LIVE, INSTRUCTOR-LED

In Class & Live, Online Training

  • 4-day instructor-led training course
  • One-on-one after course instructor coaching
  • Earn 23 CompTIA CEUs
  • Pay later by invoice -OR- at the time of checkout by credit card
View Course Details & Schedule

Standard $3285

Government $2890

RESERVE SEAT

PRODUCT #589

TRAINING AT YOUR SITE

Team Training

  • Bring this or any training to your organization
  • Full - scale program development
  • Delivered when, where, and how you want it
  • Blended learning models
  • Tailored content
  • Expert team coaching

Customize Your Team Training Experience

CONTACT US

Save More On Training with FlexVouchers – A Unique Training Savings Account

Our FlexVouchers help you lock in your training budgets without having to commit to a traditional 1 voucher = 1 course classroom-only attendance. FlexVouchers expand your purchasing power to modern blended solutions and services that are completely customizable. For details, please call 888-843-8733 or chat live.

In Class & Live, Online Training

  • Jan 29 - Feb 1 ( 4 Days)
    9:00 AM - 4:30 PM EST
    New York / Online (AnyWare) New York / Online (AnyWare) Reserve Your Seat

  • Mar 26 - 29 ( 4 Days)
    9:00 AM - 4:30 PM EDT
    Rockville, MD / Online (AnyWare) Rockville, MD / Online (AnyWare) Reserve Your Seat

  • Apr 30 - May 3 ( 4 Days)
    9:00 AM - 4:30 PM EDT
    Alexandria, VA / Online (AnyWare) Alexandria, VA / Online (AnyWare) Reserve Your Seat

  • May 21 - 24 ( 4 Days)
    9:00 AM - 4:30 PM EDT
    Ottawa / Online (AnyWare) Ottawa / Online (AnyWare) Reserve Your Seat

  • Jul 16 - 19 ( 4 Days)
    9:00 AM - 4:30 PM EDT
    New York / Online (AnyWare) New York / Online (AnyWare) Reserve Your Seat

  • Sep 24 - 27 ( 4 Days)
    9:00 AM - 4:30 PM EDT
    Rockville, MD / Online (AnyWare) Rockville, MD / Online (AnyWare) Reserve Your Seat

  • Oct 29 - Nov 1 ( 4 Days)
    9:00 AM - 4:30 PM EDT
    Alexandria, VA / Online (AnyWare) Alexandria, VA / Online (AnyWare) Reserve Your Seat

Guaranteed to Run

When you see the "Guaranteed to Run" icon next to a course event, you can rest assured that your course event — date, time, location — will run. Guaranteed.

Important Vulnerability Assessment Course Information

Vulnerability Assessment Course Outline

  • Fundamentals

    Introduction

    • Defining vulnerability, exploit, threat and risk
    • Creating a vulnerability report
    • Conducting an initial scan
    • Common Vulnerabilities and Exposure (CVE) list

    Scanning and exploits

    • Vulnerability detection methods
    • Types of scanners
    • Port scanning and OS fingerprinting
    • Enumerating targets to test information leakage
    • Types of exploits: worm, spyware, backdoor, rootkits, Denial of Service (DoS)
    • Deploying exploit frameworks
  • Analyzing Vulnerabilities and Exploits

    Uncovering infrastructure vulnerabilities

    • Uncovering switch weaknesses
    • Vulnerabilities in infrastructure support servers
    • Network management tool attacks

    Attacks against analyzers and IDS

    • Identifying Snort IDS bypass attacks
    • Corrupting memory and causing Denial of Service

    Exposing server vulnerabilities

    • Scanning servers: assessing vulnerabilities on your network
    • Uploading rogue scripts and file inclusion
    • Catching input validation errors
    • Performing buffer overflow attacks
    • SQL injection
    • Cross–Site Scripting (XSS) and cookie theft

    Revealing desktop vulnerabilities

    • Scanning for desktop vulnerabilities
    • Client buffer overflows
    • Silent downloading: spyware and adware
    • Identifying design errors
  • Configuring Scanners and Generating Reports

    Implementing scanner operations and configuration

    • Choosing credentials, ports and dangerous tests
    • Preventing false negatives
    • Creating custom vulnerability tests
    • Customizing Nessus scans
    • Handling false positives

    Creating and interpreting reports

    • Filtering and customizing reports
    • Interpreting complex reports
    • Contrasting the results of different scanners
  • Assessing Risks in a Changing Environment

    Researching alert information

    • Using the National Vulnerability Database (NVD) to find relevant vulnerability and patch information
    • Evaluating and investigating security alerts and advisories
    • Employing the Common Vulnerability Scoring System (CVSS)

    Identifying factors that affect risk

    • Evaluating the impact of a successful attack
    • Determining vulnerability frequency
    • Calculating vulnerability severity
    • Weighing important risk factors
    • Performing a risk assessment
  • Managing Vulnerabilities

    The vulnerability management cycle

    • Standardizing scanning with Open Vulnerability Assessment Language (OVAL)
    • Patch and configuration management
    • Analyzing the vulnerability management process

    Vulnerability controversies

    • Rewards for vulnerability discovery
    • Markets for bugs and exploits
    • Challenge programs

Team Training

Vulnerability Assessment Training FAQs

  • What is vulnerability assessment?

    The process of defining, identifying, classifying and prioritizing what vulnerabilities are in your system.

  • What is the purpose of a vulnerability assessment?

    The purpose of this assessment is to find out what vulnerabilities may be within your system in time to fix them.

  • What is the difference between vulnerability assessment and penetration testing?

    A vulnerability assessment scans for known vulnerabilities, while a penetration test tries to actively exploit and fix the weaknesses.

  • Can I learn vulnerability assessment online?

    Yes! We know your busy work schedule may prevent you from getting to one of our classrooms which is why we offer convenient online training to meet your needs wherever you want. This course is available in class and live online.

Questions about which training is right for you?

call 888-843-8733
chat Live Chat




100% Satisfaction Guaranteed

Your Training Comes with a 100% Satisfaction Guarantee!*

  • If you are not 100 % satisfied, you pay no tuition!
  • No advance payment required for most products.
  • Tuition can be paid later by invoice - OR - at the time of checkout by credit card.

*Partner-delivered courses may have different terms that apply. Ask for details.

New York / Online (AnyWare)
Rockville, MD / Online (AnyWare)
Alexandria, VA / Online (AnyWare)
Ottawa / Online (AnyWare)
New York / Online (AnyWare)
Rockville, MD / Online (AnyWare)
Alexandria, VA / Online (AnyWare)
Preferred method of contact:
Chat Now

Please Choose a Language

Canada - English

Canada - Français