Vulnerability Assessment

The vulnerability assessment learning path guides you through a holistic security assessment approach, where you will develop a well-structured framework for analyzing the security of a system. You will acquire the skills to perform custom vulnerability assessment for any computer system, application or network infrastructure.

7 courses  //   32 videos  //   7 hours of training

Free training week — 700+ on-demand courses and hands-on labs

Learn to assess vulnerabilities

What is the difference between doing a vulnerability assessment for a fitness tracker and an internet-connected pacemaker? Quite significant! Simple scanning may be sufficient in some cases, but others require a deeper look. In this path, you’ll learn a variety of ways to discover vulnerabilities, classify and prioritize vulnerabilities based on real-world criticality measures, define the actual risk of the vulnerabilities, create and execute an actionable remediation plan, and document and maintain a vulnerability assessment. Finally, you’ll learn some key security controls that don’t targeting specific vulnerabilities, but enhance the overall security of your system.

Learning path components

Vulnerability Assessment Skill Assessment
Assessment
Vulnerability Assessment Skill Assessment

Vulnerability Assessment Skill Assessment

See how your vulnerability assessment skills stack up against other professionals in your field.

Number of questions: 20

Vulnerability Assessment Project
Practice Exam
Vulnerability Assessment Project

Vulnerability Assessment Project

Test your vulnerability assessment skills as your progress through seven challenges leveraging free-to-use security tools and services. First you'll set up your environment using JDK 11, Maven 3.6.3 and Git. Then you'll use SNYK, static application security testing with Coverity Scan and a risk assessment template to discover, identify and rate the CWEs and CVEs. Finally, you'll find the most appropriate fixes for the two vulnerabilities with the highest risk.

Number of questions: 7

Vulnerability Management in a Nutshell
Course
Vulnerability Management in a Nutshell

Vulnerability Management in a Nutshell

This course covers the basics of vulnerability assessment, including definitions, scope, policy and process.

4 videos
30 minutes of training

Vulnerability Discovery
Course
Vulnerability Discovery

Vulnerability Discovery

This course guides you through five different type of security tools for discovering vulnerabilities in various environments.

5 videos
108 minutes of training

Vulnerability Classification
Course
Vulnerability Classification

Vulnerability Classification

This course covers three main topics: false positives, standardized vulnerabilities, and weakness classification systems and threat-based vulnerability/weakness classification.

3 videos
39 minutes of training

Prioritization and Risk Assessment
Course
Prioritization and Risk Assessment

Prioritization and Risk Assessment

This course covers how to classify and prioritize vulnerabilities based on real-world criticality measures and how to define the true risk of the vulnerabilities for a specific environment.

5 videos
71 minutes of training

Vulnerability Assessment Documentation and Maintenance
Course
Vulnerability Assessment Documentation and Maintenance

Vulnerability Assessment Documentation and Maintenance

This course covers how to create comprehensive, clear and easy-to-understand vulnerability assessment documentation, and how to go about keeping the vulnerability findings and scoring current.

3 videos
43 minutes of training

Remediation and Mitigation
Course
Remediation and Mitigation

Remediation and Mitigation

In this course, we will cover a wide range of topics about the vulnerability remediation and mitigation process, including the most common remediations and mitigations and strategies for deployment of security measures.

5 videos
56 minutes of training

Key Security Controls
Course
Key Security Controls

Key Security Controls

This course covers the top most effective security controls to reduce the overall risk of systems and networks. Recommendation of such controls is a perfect add-on for any vulnerability assessment.

7 videos
80 minutes of training

 

What you’ll learn.

  • Variety of ways to discover vulnerabilities
  • How to classify and prioritize vulnerabilities based on real-world criticality measures
  • How to look at the bigger picture and define the actual risk of the vulnerabilities for your specific environment
  • How to create and execute an actionable remediation plan
  • How to document and maintain a vulnerability assessment

Who is this for?

  • Security architects
  • Security engineers
  • Security consultants
  • Risk and hazard managers
  • Anyone who wants to learn about assessing security risk

Train on your schedule

Personal
Teams

Infosec Skills subscription

Monthly
Annually
  • 80+ role-based learning paths (Ethical Hacking, Threat Hunting, etc.)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (CISSP, Security+, etc.)
  • Skill assessments
  • Infosec peer community support
  • Create custom learning paths from 100s of courses

Infosec Skills boot camp

Request a quote for pricing

 

Request Quote Browse Boot Camps
  • Exam Pass Guarantee
    If you don’t pass your exam on the first attempt, you'll get a second attempt for free. Includes the ability to re-sit the course for free for up to one year.
  • 100% Satisfaction Guarantee
    If you’re not 100% satisfied with your training at the end of the first day, you may withdraw and enroll in a different online or in-person course.
  • Live, instructor-led training (available in-person or online)
  • 90 day extended access to recordings of daily lessons
  • Certification exam voucher
  • Learn by doing with hundreds of additional hands-on courses and labs Infosec Skills Annual

Infosec Skills subscription

Annual

$599 per learner / year

Request Quote Free Team Trial
  • Team administration and reporting
  • Transferable licenses
  • 80+ role-based learning paths (Ethical Hacking, Threat Hunting, etc.)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (CISSP, Security+, etc.)
  • Skill assessments
  • Create and assign custom learning paths
  • Dedicated client success manager

Infosec Skills boot camp

Request a quote for pricing

 

Request Quote Browse Boot Camps
  • Team boot camp administration and reporting
  • Exam Pass Guarantee
    If you don’t pass your exam on the first attempt, you'll get a second attempt for free. Includes the ability to re-sit the course for free for up to one year.
  • 100% Satisfaction Guarantee
    If you’re not 100% satisfied with your training at the end of the first day, you may withdraw and enroll in a different online or in-person course.
  • Knowledge Transfer Guarantee
    If an employee leaves within three months of obtaining certification, Infosec will train a different employee at the same organization tuition-free for up to one year.
  • Certification exam vouchers
  • Live, instructor-led training (available onsite, in-person or online)
  • 90 days extended access to recordings of daily lessons
  • Build your team's skills with hundreds of additional hands-on courses and labs

Award-winning training that you can trust

Best Software - Highest Satisfaction

Best Software - Highest Satisfaction

Infosec Skills

Best IT Security-related Training Program

Best IT Security-related Training Program

Infosec Skills

Best Cybersecurity Education Provider & Best Security Education Platform

Best Cybersecurity Education Provider & Best Security Education Platform

Infosec Skills

Most Innovative Product - Cybersecurity Training for Infosec Professionals

Most Innovative Product - Cybersecurity Training for Infosec Professionals

Infosec Skills

Global Excellence - Cyber Security Education & Training

Global Excellence - Cyber Security Education & Training

Infosec Skills

Exceptional learning experiences powered by LX Labs cyber expertise

Infosec Skills courses and labs are powered by LX Labs — our elite team of cyber SMEs, learning specialists and community of top-ranked security instructors, published authors and sought-after industry leaders. We rigorously vet all Infosec Skills training resources to guarantee they meet certification and compliance requirements and align with recognized guidelines like the NICE Cybersecurity Workforce Framework.

LX Labs

SC Media names Infosec Skills Best IT Security Training

See for yourself why Infosec Skills leads the cybersecurity training industry.