Vulnerability Assessment

The vulnerability assessment learning path guides you through a holistic security assessment approach, where you will develop a well-structured framework for analyzing the security of a system. You will acquire the skills to perform custom vulnerability assessment for any computer system, application or network infrastructure.

7 courses  //   32 videos  //   7 hours of training

Free training week — 1,200+ on-demand courses and hands-on labs

Learn to assess vulnerabilities

What is the difference between doing a vulnerability assessment for a fitness tracker and an internet-connected pacemaker? Quite significant! Simple scanning may be sufficient in some cases, but others require a deeper look. In this path, you’ll learn a variety of ways to discover vulnerabilities, classify and prioritize vulnerabilities based on real-world criticality measures, define the actual risk of the vulnerabilities, create and execute an actionable remediation plan, and document and maintain a vulnerability assessment. Finally, you’ll learn some key security controls that don’t targeting specific vulnerabilities, but enhance the overall security of your system.

Learning path components

Vulnerability Assessment Skill Assessment
Assessment
Vulnerability Assessment Skill Assessment

Vulnerability Assessment Skill Assessment

See how your vulnerability assessment skills stack up against other professionals in your field.

Number of questions: 20

Vulnerability Assessment Project
Practice Exam
Vulnerability Assessment Project

Vulnerability Assessment Project

Test your vulnerability assessment skills as your progress through seven challenges leveraging free-to-use security tools and services. First you'll set up your environment using JDK 11, Maven 3.6.3 and Git. Then you'll use SNYK, static application security testing with Coverity Scan and a risk assessment template to discover, identify and rate the CWEs and CVEs. Finally, you'll find the most appropriate fixes for the two vulnerabilities with the highest risk.

Number of questions: 7

Vulnerability Management in a Nutshell
Course
Vulnerability Management in a Nutshell

Vulnerability Management in a Nutshell

This course covers the basics of vulnerability assessment, including definitions, scope, policy and process.

4 videos
30 minutes of training

Vulnerability Discovery
Course
Vulnerability Discovery

Vulnerability Discovery

This course guides you through five different type of security tools for discovering vulnerabilities in various environments.

5 videos
108 minutes of training

Vulnerability Classification
Course
Vulnerability Classification

Vulnerability Classification

This course covers three main topics: false positives, standardized vulnerabilities, and weakness classification systems and threat-based vulnerability/weakness classification.

3 videos
39 minutes of training

Prioritization and Risk Assessment
Course
Prioritization and Risk Assessment

Prioritization and Risk Assessment

This course covers how to classify and prioritize vulnerabilities based on real-world criticality measures and how to define the true risk of the vulnerabilities for a specific environment.

5 videos
71 minutes of training

Vulnerability Assessment Documentation and Maintenance
Course
Vulnerability Assessment Documentation and Maintenance

Vulnerability Assessment Documentation and Maintenance

This course covers how to create comprehensive, clear and easy-to-understand vulnerability assessment documentation, and how to go about keeping the vulnerability findings and scoring current.

3 videos
43 minutes of training

Remediation and Mitigation
Course
Remediation and Mitigation

Remediation and Mitigation

In this course, we will cover a wide range of topics about the vulnerability remediation and mitigation process, including the most common remediations and mitigations and strategies for deployment of security measures.

5 videos
56 minutes of training

Key Security Controls
Course
Key Security Controls

Key Security Controls

This course covers the top most effective security controls to reduce the overall risk of systems and networks. Recommendation of such controls is a perfect add-on for any vulnerability assessment.

7 videos
80 minutes of training

 

What you’ll learn.

  • Variety of ways to discover vulnerabilities
  • How to classify and prioritize vulnerabilities based on real-world criticality measures
  • How to look at the bigger picture and define the actual risk of the vulnerabilities for your specific environment
  • How to create and execute an actionable remediation plan
  • How to document and maintain a vulnerability assessment

Who is this for?

  • Security architects
  • Security engineers
  • Security consultants
  • Risk and hazard managers
  • Anyone who wants to learn about assessing security risk

Meet the author

Mitko Katsev

Mitko Katsev has nine years of education in system programming and computer engineering, and over eight years work experience in software development and security. He started his career as a software engineer before transitioning into information security and application security. He currently works at his own security consultancy company, ArmadilCo.

He’s completed various InfoSec/AppSec training and certifications, including SANS Defensible Security Architecture and Engineering (SEC530), SANS Defending Advanced Adversaries - Purple Team Tactics (SEC599), multiple Microsoft security development lifecycle (SDL) trainings and more.

Plans & pricing

Personal
Teams

Infosec Skills subscription

Monthly
Annually
  • 140+ role-based learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support
  • Create custom learning paths from 100s of courses

Live boot camp

Request a quote for pricing

 

Request Quote Browse Boot Camps
  • Exam Pass Guarantee
    If you don’t pass your exam on the first attempt, you'll get a second attempt for free. Includes the ability to re-sit the course for free for up to one year.
  • 100% Satisfaction Guarantee
    If you’re not 100% satisfied with your training at the end of the first day, you may withdraw and enroll in a different online or in-person course.
  • Live, instructor-led training (in-person or live online)
  • 90 day extended access to recordings of daily lessons
  • Certification exam voucher
  • Learn by doing with hundreds of additional hands-on courses and labs

Infosec Skills Teams subscription

Annual

$599 per learner / year

Request Team Quote Free Team Trial
  • Team administration and reporting
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 140+ role-based learning paths (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Skill assessments
  • Create and assign custom learning paths
  • Dedicated client success manager

Live team boot camp

Request a quote for pricing

 

Request Team Quote Browse Boot Camps
  • Team boot camp administration and reporting
  • Exam Pass Guarantee
    If you don’t pass your exam on the first attempt, you'll get a second attempt for free. Includes the ability to re-sit the course for free for up to one year.
  • 100% Satisfaction Guarantee
    If you’re not 100% satisfied with your training at the end of the first day, you may withdraw and enroll in a different online or in-person course.
  • Knowledge Transfer Guarantee
    If an employee leaves within three months of obtaining certification, Infosec will train a different employee at the same organization tuition-free for up to one year.
  • Certification exam vouchers
  • Live, instructor-led training (onsite, in-person or live online)
  • 90 days extended access to recordings of daily lessons
  • Build your team's skills with hundreds of additional hands-on courses and labs

Award-winning training that you can trust

Technical Skills Development, Online Course Providers & eLearning Content

Technical Skills Development, Online Course Providers & eLearning Content

Infosec Skills

eLearning Content

eLearning Content

Infosec Skills

Best Product - Cybersecurity Training for Infosec Professionals

Best Product - Cybersecurity Training for Infosec Professionals

Infosec Skills

Security Education & Platform

Security Education & Platform

Infosec Skills

Ranked #52 in Top 100 Global Software Sellers

Ranked #52 in Top 100 Global Software Sellers

Infosec

Exceptional learning experiences powered by LX Labs cyber expertise

Infosec Skills courses and labs are powered by LX Labs — our elite team of cyber SMEs, learning specialists and community of top-ranked security instructors, published authors and sought-after industry leaders. We rigorously vet all Infosec Skills training resources to guarantee they meet certification and compliance requirements and align with recognized guidelines like the NICE Workforce Framework for Cybersecurity.

LX Labs

SC Media names Infosec Skills Best IT Security Training

See for yourself why Infosec Skills leads the cybersecurity training industry.