Course Duration
16 hours, 2-day training workshop
Delivery
Face to face training or online training
Course Inclusive
Training materials & certificate of completion
Course Description
This course is an introductory course for those who want to increase the security posture of their organization by performing vulnerability assessments. It aims to provide the trainees the fundamentals of vulnerability assessment leading to performing of an actual vulnerability assessment and tips on creating an effective report.
ENTRY COMPETENCIES of Participants (Prerequisites):
Any graduate of Engineering, Science, or any BS degree courses that has Information Technology units or anyone with experience on handling ICT equipment.
Course Objectives/Learning Outcomes
At the end of the course, the participant shall be able to:
- Perform discovery to effectively identify assets;
- Discovery and enumeration of the target network
- Scanning with Nmap and Zenmap
- Identify threat vectors, threat models, and possible attack vectors relevant to their environment;
- Threat Modeling
- Risk Assessment Matrices and Rating Systems
- Perform vulnerability assessments and verify its findings
- Perform vulnerability discovery using open-source and commercial tools
- Scanning with Nmap Scripting Engine, Nessus and Acunetix
- Manual vulnerability validation and introduction to PowerShell
- Perform vulnerability triage and prioritization
- Assessing vulnerabilities and its importance accordingly to the organizationâs goals
- Create and communicate effectively with management by creating effective reports
- Creating effective vulnerability assessment reports