This course provides a solid understanding of the tools an IT engineer needs to review an Information System. In this course, you will learn the importance of vulnerability assessments and how they are used to prevent serious cyber break-ins. Lessons include understanding malware and viruses and how they can infiltrate an organization’s network. After you take this course, you will be able to assess a company’s security posture and perform a basic vulnerability test. Plus, you will be able to generate reports to guide new security implementation.


* Actual course outline may vary depending on offering center. Contact your sales representative for more information.

Learning Objectives

Upon completion, theCertified Vulnerability Assessorcandidate will be able to competently take the exam.

  • Course Outline

  • Why Vulnerability Assessment
    Vulnerability Types
    Assessing the Network
    Assessing Web Servers and Applications
    Assessing Remote and VPN Services
    Vulnerability Assessments & Tools of the Trade
    Output Analysis


Information System Owners Analysts Ethical Hackers ISSOs Cyber Security Managers IT Engineers




There are no stated prerequisites for this course. Please check with your representative for details.


Length: 3.0 days (24 hours)


Not Your Location? Change

Course Schedule:

To request a custom delivery, please chat with an expert.