Skip to main content

Vulnerability Assessment Management Labs

Code: E007 Category: Tag:

Learn the security techniques used by the Internet’s most skilled professionals. This Vulnerability & Assessment Management lab bundle, which includes 19 distinct, hands-on labs, will prepare you with the tools and techniques to detect and exploit security vulnerabilities in web-based applications, networks, and computer systems that use the Windows and Linux OS, as well as recommend mitigation countermeasures.

This lab bundle is designed to align to the learning objectives found in the National Cybersecurity Workforce Framework work role for Vulnerability Assessment Analyst per NIST SP-800-181, as well as the course content for Course 589, Vulnerability Assessment Training: Protecting Your Organization.

Vulnerability Assessment Management Labs Delivery Methods
6-month access to CYBRScore Vulnerability Assessment Management Labs
Content aligned to National Cybersecurity Workforce Framework work role for Vulnerability Assessment Analyst per NIST SP-800-181
Vulnerability Assessment Management Labs Course Benefits
Practice the objectives presented in the National Cybersecurity Workforce Framework work role for Vulnerability Assessment Analyst per NIST SP-800-181Detect and exploit security vulnerabilities in web-based applications, networks, and computer systems that use the Windows and Linux OS, as well as recommend mitigation countermeasuresPerform the steps necessary to set up a firewall from the basic command line interface
Vulnerability Assessment Management Lab Content
Additional Scanning Options

Students will leverage Nmap, a network discovery and mapping tool, to identify the systems on a network of responsibility. Students will utilize non-traditional scans to attempt avoiding an Intrusion Detection System (IDS).

Analyze and Classify Malware
Analyze Browser-based Heap Spray Attack
Analyze Various Data Sources to Confirm Suspected Infection
Comprehensive Threat Response
Core Impact Web Application Penetration Testing
Creating Recommendations Based on Vulnerability Assessments
Data Backup and Recovery
Firewall Setup and Configuration
Gap Analysis of Firewall Rules
Identifying System Vulnerabilities with OpenVAS
Manually Analyze Malicious PDF Documents
Microsoft Baseline Security Analyzer
Monitoring Network Traffic
Network Discovery
Recover from SQL Injection Attack
Using Snort and Wireshark to Analyze Traffic
Vulnerability Analysis/Protection
Whitelisting & Suspicious File Verification

Request Quotes

Register now

jQuery Best Practices for Legacy and Today

Introduction to Docker Training

Microsoft Dynamics 365 Sales Training (MB-210)

Fundamentals of Statistics for Data Science Training

User Experience (UX) Design Training for Successful Software Development

Administrative Essentials for New Admins in Lightning Experience (ADX201) Training

SQL Server Integration Services (SSIS) Training for Business Intelligence

Securing Networks with Cisco Firepower Next-Generation IPS (SSFIPS v3.0) Training

Introduction to Modeling for Business Analysis Training

Deploy and Manage Citrix ADC 13.x with Citrix Gateway Training (CNS227)

arالعربية