CERTIFIED Vulnerability assessor
Vulnerability Assessor course, C)VA provides an solid understanding of the tools an IT engineer needs to review an Information System. In this course, you will learn the importance of vulnerability assessments and how they are used to prevent serious cyber break-ins. Lessons include understanding malware and viruses and how they can infiltrate an organization’s network. After you take this course, you will be able to assess a company’s security posture and perform a basic vulnerability test. Plus, you will be able to generate reports to guide new security implementation.
Description
Topics Covered
Description
Who should attend?
- Information System Owners
- Analysts
- Ethical Hackers
- ISSOs
- Cyber Security Managers
- IT Engineers
Topics Covered
Module 01 | Why Vulnerability Assessment |
Module 02 | Vulnerability Types |
Module 03 | Assessing the Network |
Module 04 | Assessing Web Servers and Applications |
Module 05 | Assessing Remote and VPN Services |
Module 06 | Vulnerability Assessments & Tools of the Trade |
Module 07 | Output Analysis |
Why Cyber Security ?
Confidentiality
Confidentiality measures are designed to protect against unauthorized disclosure of information.
Integrity
Integrity involves protection from unauthorized modifications (e.g., add, delete, or change) of data.
Availability
Availability is protecting the functionality of support systems and ensuring data is fully available .