In this course students will learn how to analyze vulnerability data to aid in the prioritization of remediation. Students will learn how to "tag" data with "key words" for analysis. Students can use this method to quickly identify which vulnerabilities in their environment can lead to initial access and privilege escalation among other things. Students will receive an Excel-based workbook with worksheet set up to do this "tagging" and auto-generate related charts.
Learning Objectives
This course introduces students to an Excel-based FAIR compliant model and gives them a working knowledge of the FAIR ™ standard and how to use this method for quantifying cyber risk in terms of financial impact.
Framework Connections
Competency Areas
Work Roles
Feedback
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.