Vulnerability Assessment Management Labs

Level: Foundation

Learn the security techniques used by the Internet’s most skilled professionals. This Vulnerability & Assessment Management lab bundle, which includes 19 distinct, hands-on labs, will prepare you with the tools and techniques to detect and exploit security vulnerabilities in web-based applications, networks, and computer systems that use the Windows and Linux OS, as well as recommend mitigation countermeasures.

 

This lab bundle is designed to align to the learning objectives found in the National Cybersecurity Workforce Framework work role for Vulnerability Assessment Analyst per NIST SP-800-181, as well as the course content for Course 589, Vulnerability Assessment Training: Protecting Your Organization.

Key Features of this Training:

  • 6-month access to CYBRScore Vulnerability Assessment Management Labs
  • Content aligned to National Cybersecurity Workforce Framework work role for Vulnerability Assessment Analyst per NIST SP-800-181

You Will Learn How To:

  • Practice the objectives presented in the National Cybersecurity Workforce Framework work role for Vulnerability Assessment Analyst per NIST SP-800-181
  • Detect and exploit security vulnerabilities in web-based applications, networks, and computer systems that use the Windows and Linux OS, as well as recommend mitigation countermeasures
  • Perform the steps necessary to set up a firewall from the basic command line interface

Choose the Training Solution That Best Fits Your Individual Needs or Organizational Goals

ON DEMAND

On Demand

6-Month Access to:

  • Pre-configured labs with lab guides
  • Gain hands-on skills in topic areas aligned to National Cybersecurity Workforce Framework work role for Vulnerability Assessment Analyst per NIST SP-800-181
View Course Details

Standard $125

Government $125

ADD TO CART

PRODUCT #E007

Save More On Training with FlexVouchers – A Unique Training Savings Account

Our FlexVouchers help you lock in your training budgets without having to commit to a traditional 1 voucher = 1 course classroom-only attendance. FlexVouchers expand your purchasing power to modern blended solutions and services that are completely customizable. For details, please call 888-843-8733 or chat live.

On Demand

Important Course Information

  • CYBRScore Labs Description

    Practice your skills in a virtual network environment. Learn by doing wherever you are on your own time at your own pace. CYBRScore Labs are pre-configured hardware layouts with accompanying lab guides for fast, convenient access that make studying for an exam or learning new technologies an engaging experience. CYBRScore Labs are available for use for 6 months after the date of purchase. CYBRScore Labs are hosted online and available 24x7x365.

Vulnerability Assessment Management Lab Content

  • Additional Scanning Options

    Students will leverage Nmap, a network discovery and mapping tool, to identify the systems on a network of responsibility. Students will utilize non-traditional scans to attempt avoiding an Intrusion Detection System (IDS).

  • Analyze and Classify Malware

    In this lab you will attempt to conduct basic analysis on some malware samples that were found on the internal network.

  • Analyze Browser-based Heap Spray Attack

    Students will identify a browser-based attack used against a corporate asset using a network protocol analyzer. Students will determine the type of attack used and pinpoint exploit code in network traffic.

  • Analyze Various Data Sources to Confirm Suspected Infection

    Students will review network traffic to confirm the presence of malicious activity using various tools including Wireshark and VirusTotal.com.

  • Comprehensive Threat Response

    In this final lab we will attempt to exercise all the relevant skills found in this domain. We are focusing on responding to incidents and the skills needed to address these sorts of problems at the "Practitioner" level.

  • Core Impact Web Application Penetration Testing

    This lab introduces students to the web application penetration testing suite within the Core Impact application.

  • Creating Recommendations Based on Vulnerability Assessments

    Students will use OpenVAS to do a vulnerability analysis and fill out a recommendation form for the vulnerabilities found in the network.

  • Data Backup and Recovery

    In this lab we will simulate the recovery phase where we must perform a backup in a server environment.

  • Firewall Setup and Configuration

    In this lab you will perform the steps necessary to set up a pfSense firewall from the basic command line interface and then configure the firewall using the web configuration GUI on a Windows machine. This lab will provide an understanding how network interfaces are configured to allow network connectivity. You will also view and create a firewall rule which enforces your understanding of how network traffic can be managed at different levels – (IP-based, Protocol-based, Machine-based, etc).

  • Gap Analysis of Firewall Rules

    Students will log into an organization's firewall, document existing firewall rules, analyze these rules and making recommendations based on this analysis. Students will then make make the necessary changes.

  • Identifying System Vulnerabilities with OpenVAS

    Students will scan a system in OpenVAS (Open Vulnerability Assessment) to discover and identify systems on the network that have vulnerabilities.

  • Manually Analyze Malicious PDF Documents

    Several company employees have received unsolicited emails with suspicious pdf attachments. The CIO has asked you to look at the attachments and see if they are malicious.

  • Microsoft Baseline Security Analyzer

    In this lab you will use Microsoft Baseline Security Analyzer (MBSA) to perform scans of individual host computers and of groups of computers. You will also learn how to perform the most common scans using command line tools. Once completed, you will have learned how to use MBSA to perform a comprehensive security analysis of your network environment.

  • Monitoring Network Traffic

    In this lab we will replicate potentially malicious scans from the Internet against a corporate asset. Scans from the Internet are very common. An analyst should know how to identify this activity by artifacts that are present in the IDS as well as entries in the web logs.

  • Network Discovery

    The Network Discovery lab is designed to help students facilitate open source collection by teaching them how to use more intimate network discovery techniques.

  • Recover from SQL Injection Attack

    After identifying a SQL Injection attack, students will learn about parameterized queries in back-end web servers to minimize future SQLi attacks.

  • Using Snort and Wireshark to Analyze Traffic

    In this lab we will replicate the need for Analysts to be able to analyze network traffic and detect suspicious activity. Tools like Wireshark and Snort can be utilized to read, capture, and analyze traffic.

  • Vulnerability Analysis/Protection

    Students will use OpenVAS to do a vulnerability analysis. Students will then identify applicable vulnerabilities and protect their system(s) against them.

  • Whitelisting & Suspicious File Verification

    Students will become familiar with procedures used in the validation of suspicious files. During the course of the lab the student will generate a system-level baseline using a command line file hash tool, followed by checking new/unknown files against whitelists and online tools.

FAQs

  • What does it mean that this offering aligns to a course?

  • What is a CYBRScore Lab Bundle?

    • CYBRScore Labs are pre-configured hardware layouts with accompanying lab guides for fast, convenient access that make studying for an exam or learning new technologies an engaging experience.
  • How long will each lab take to complete?

    • Each lab consists of multiple tasks that take anywhere from 30 minutes to 2 hours to complete.
  • Are there any system requirements?

    • All you need is an HTML5 compatible browser, such as Google Chrome, Mozilla Firefox, or Microsoft Edge.
  • How long do I have access to the labs for?

    • CYBRScore Labs are available for use for 6 months after the date of purchase. CYBRScore Labs are hosted online and available 24x7x365.
  • How do I access my purchased labs?

    • Once your purchase is complete, Learning Tree will contact you with the URL and login credentials you will use to access your lab bundle.

Questions about which training is right for you?

call 888-843-8733
chat Live Chat




100% Satisfaction Guaranteed

Your Training Comes with a 100% Satisfaction Guarantee!*

*Partner-delivered courses may have different terms that apply. Ask for details.

Preferred method of contact:
Chat Now

Please Choose a Language

Canada - English

Canada - Français