Nikolas Behar

Sr. Security Consultant and Adjunct Professor of Cybersecurity, Deloitte

Nikolas is a Sr. Security Consultant and Adjunct Professor of Cybersecurity focused on advanced adversary simulation, penetration testing and vulnerability management. He has vast experience across many information security domains, such as cyber defense, cyber risk, security strategy, offensive security, security awareness and security operations.

Nikolas has worked at several organizations throughout Southern California and has been a consultant at PwC, Accenture and Deloitte. He primarily lectures on ethical hacking, digital forensics and information assurance. He has also sat on several information security panels, spoken at several information security conferences, and appears on news outlets to discuss information security-related issues.

Nikolas received his M.Sc in information security from Royal Holloway, the University of London and his B.A. in political science from UC, San Diego. He holds OSCP, CISSP and CISA certifications.

Content from Nikolas Behar

Introduction to Vulnerability Management
Learning Path
Introduction to Vulnerability Management

Introduction to Vulnerability Management

The Introduction to Vulnerability Management Learning Path will enable you to master a repeatable, documented and continuously improving vulnerability management program. You will learn how to use the same techniques used by organizations with mature vulnerability management programs covering tens of thousands of endpoints.

Introduction to Vulnerability Management
Course
Introduction to Vulnerability Management

Introduction to Vulnerability Management

This course serves as an introduction to the learning path.

Setting Up Your System
Course
Setting Up Your System

Setting Up Your System

This course will look at how to set up your virtual environment in order to follow along.

Vulnerability Management Process
Course
Vulnerability Management Process

Vulnerability Management Process

This course will go over the different parts of the vulnerability management process.

Automated Vulnerability Scanners
Course
Automated Vulnerability Scanners

Automated Vulnerability Scanners

This course will provide an overview of automated vulnerability scanners and why we would use them.

Manual Vulnerability
Course
Manual Vulnerability

Manual Vulnerability

This course will look at how to manually verify the existence of vulnerabilities on a host or group of hosts.

Prioritizing Vulnerabilities
Course
Prioritizing Vulnerabilities

Prioritizing Vulnerabilities

In this course, we will look at prioritizing different vulnerabilities in our environment and CVSS scores.

Remediation
Course
Remediation

Remediation

In this course, we will look at how to approach the remediation of discovered vulnerabilities.

Web Application Vulnerabilities
Course
Web Application Vulnerabilities

Web Application Vulnerabilities

This course will examine web application vulnerabilities.

Frameworks
Course
Frameworks

Frameworks

This course will examine vulnerability management in several frameworks.

Vulnerability Management Summary
Course
Vulnerability Management Summary

Vulnerability Management Summary

This course will look at everything we have learned throughout the path.

Exceptional learning experiences powered by LX Labs cyber expertise

Infosec Skills courses and labs are powered by LX Labs — our elite team of cyber SMEs, learning specialists and community of top-ranked security instructors, published authors and sought-after industry leaders. We rigorously vet all Infosec Skills training resources to guarantee they meet certification and compliance requirements and align with recognized guidelines like the NICE Cybersecurity Workforce Framework.