The Vulnerability Assessment Analyst gives guidance, knowledge, and proficiency in the core skills necessary for a career as a Vulnerability Assessment Analyst. The Career Path will have a structured curriculum with specialized learning activities that will give you real-world training on Auditing Compliance, Penetration Testing Fundamentals, Audit Toolkit, Auditing Reports, Technical Countersurveillance, Information Gathering, and Risk Management.The program is also aligned with the NIST Cybersecurity Framework, and you will learn how to be a Vulnerability Assessment Analyst that performs assessments of systems and networks within the network environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. They also measure the effectiveness of defense-in-depth architecture against known vulnerabilities.

Test your knowledge and proficiency in the core skills needed for this career.

Vulnerability Assessment Analyst Workrole Assessment

This assessment will test your knowledge and proficiency in the core skills necessary for the Vulnerability Assessment Analyst work-role. The assessment will test your knowledge on Auditing Compliance, Penetration Testing Fundamentals, Audit Toolkit, Auditing Reports, Technical Countersurveillance, Information Gathering, and Risk Management. A Vulnerability Assessment Analyst performs assessments of systems and networks within the network environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. They also measure the effectiveness of defense-in-depth architecture against known vulnerabilities.

TAKE ASSESSMENT

Feel confident you are learning with the best

After having helped grow the careers of 2.5 million cybersecurity professionals around the world and individuals from thousands of companies, be rest assured you are choosing the right program from a provider with the track-record to show for it.

Cyber Security Excellence Awards Gold Winner 2018Cyber Security Excellence Awards Gold Winner 2017Best Cybersecurity Education Provider Gold Winner 2016The Golden Bridge Awards Gold Winner 2016
video cyb icon

Expertly crafted curriculum aligned to your experience and career goals

virtual lab icon cyb

In-browser virtual environments and challenges to give you real experience and practical skills

chat icon cyb

Connect and chat with a dedicated mentor to guide you throughout your journey

resume prep cyb icon

Prepare for the interview and finish the program with further career development guidance

Labs

Vulnerability Scanner Set-up and ConfigurationCreating Recommendations Based on Vulnerability AssessmentsIdentifying System Vulnerabilities with OpenVASPatches and UpdatesPatch Installation and Validation TestingInstalling Patches and Testing SoftwareCompTIA Security+ 501CompTIA Security+ SY0-501Host Data Integrity BaseliningEvent Log CollectionLog CorrelationLog Correlation & Analysis to Identify Potential IOCLog Correlation and AnalysisConduct Log Analysis and Cross Examination for False PositivesLog Event ReportsUse PowerShell To Gather Computer Information in WindowsIntroduction To OWASP Top Ten: A1 - Injection - ScoredIntroduction To OWASP Top Ten: A2 - Broken Authentication - ScoredIntroduction To OWASP Top Ten: A3 - Sensitive Data Exposure - ScoredIntroduction To OWASP Top Ten: A4 - XML External Entities - ScoredIntroduction To OWASP Top Ten: A5 - Broken Access Control - ScoredIntroduction To OWASP Top Ten: A6 - Security Misconfiguration - ScoredIntroduction To OWASP Top Ten: A7 - Cross Site Scripting - ScoredIntroduction To OWASP Top Ten: A8 - Insecure Deserialization - ScoredIntroduction To OWASP Top Ten: A9 - Using Components With Known Vulnerabilities - ScoredIntroduction To OWASP Top Ten: A10 - Insufficient Logging and Monitoring - ScoredIntroduction To OWASP Top Ten: Capstone - ScoredXSS StoredXSS ReflectedWASE Learning - Insecure DeserializationWASE Learning - XML External EntitiesIntroduction to WiresharkWiresharkApplying Filters to TCPDump and WiresharkCertified Ethical Hacker (CEH)Certified Information Systems Auditor (CISA)Certified Information Systems Security Professional (CISSP)
Enroll Now

Program Starts On October 20th