Skip to main content

Vulnerability Assessment Management Labs

Code: E007 Category: Tag:

Learn the security techniques used by the Internet’s most skilled professionals. This Vulnerability & Assessment Management lab bundle, which includes 19 distinct, hands-on labs, will prepare you with the tools and techniques to detect and exploit security vulnerabilities in web-based applications, networks, and computer systems that use the Windows and Linux OS, as well as recommend mitigation countermeasures.

This lab bundle is designed to align to the learning objectives found in the National Cybersecurity Workforce Framework work role for Vulnerability Assessment Analyst per NIST SP-800-181, as well as the course content for Course 589, Vulnerability Assessment Training: Protecting Your Organization.

Vulnerability Assessment Management Labs Delivery Methods
6-month access to CYBRScore Vulnerability Assessment Management Labs
Content aligned to National Cybersecurity Workforce Framework work role for Vulnerability Assessment Analyst per NIST SP-800-181
Vulnerability Assessment Management Labs Course Benefits
Practice the objectives presented in the National Cybersecurity Workforce Framework work role for Vulnerability Assessment Analyst per NIST SP-800-181Detect and exploit security vulnerabilities in web-based applications, networks, and computer systems that use the Windows and Linux OS, as well as recommend mitigation countermeasuresPerform the steps necessary to set up a firewall from the basic command line interface
Vulnerability Assessment Management Lab Content
Additional Scanning Options

Students will leverage Nmap, a network discovery and mapping tool, to identify the systems on a network of responsibility. Students will utilize non-traditional scans to attempt avoiding an Intrusion Detection System (IDS).

Analyze and Classify Malware
Analyze Browser-based Heap Spray Attack
Analyze Various Data Sources to Confirm Suspected Infection
Comprehensive Threat Response
Core Impact Web Application Penetration Testing
Creating Recommendations Based on Vulnerability Assessments
Data Backup and Recovery
Firewall Setup and Configuration
Gap Analysis of Firewall Rules
Identifying System Vulnerabilities with OpenVAS
Manually Analyze Malicious PDF Documents
Microsoft Baseline Security Analyzer
Monitoring Network Traffic
Network Discovery
Recover from SQL Injection Attack
Using Snort and Wireshark to Analyze Traffic
Vulnerability Analysis/Protection
Whitelisting & Suspicious File Verification

Request Quotes

Register now
CAPTCHA image

Please type the characters This helps us prevent spam, thank you.

Understanding Cisco Wireless Foundations (WLFNDU v1.0) Training

Python Fundamentals Training

Introduction to Premiere Pro CC Training

Building Applications and Solutions with Microsoft 365 Core Services (MS-600)

Lean Six Sigma: Green Belt Certification Training

Advanced Developing on AWS

Delivery at Scale Training (ICP-DAS Certification)

Identity and Access Management Training

Administrative Essentials for New Admins in Lightning Experience (ADX201) Training

Securing Networks with Cisco Firepower Next-Generation IPS (SSFIPS v3.0) Training

arالعربية