Breadcrumb
  1. Training
  2. Education & Training Catalog
  3. ISACA
  4. ISACA Cybersecurity: Vulnerability, Identification & Analysis Online Course

ISACA Cybersecurity: Vulnerability, Identification & Analysis Online Course

Identifying vulnerabilities is vital in keeping networks secure. The ISACA Cybersecurity: Vulnerability, Identification & Analysis Online Course teaches students how to conduct a thorough vulnerability analysis. Students will learn how to conduct open-source research to gather information on vulnerabilities and exploits. That research will help determine what to prioritize when addressing vulnerabilities in a system.

Provider Information

More courses from this provider:
Contact Information

ISACA
1700 E. Golf Rd., Suite 400
Schaumburg, IL 60173

Course Overview

Overall Proficiency Level
1 - Basic
Course Prerequisites

None

Training Purpose
Skill Development
Specific Audience
All
Delivery Method
Online, Self-Paced
  • Online, Self-Paced

Learning Objectives

  • Define key cybersecurity terms
  • Explain the difference between vulnerability and exploit.
  • Differentiate between the roles and responsibilities of red, blue, and purple teams.
  • Explain what a typical cybersecurity functional structure looks like
    Describe the role of the security operations center (SOC).
  • List the typical responsibilities of a SOC analyst.
  • Explain the importance of an incident response plan.
  • Describe the components of an incident response plan.
  • Explain the importance of open-source research to gather information about a target.
  • Conduct open-source research by searching Google more effectively.
  • Use tools and resources, such as robots.txt, the Google Hacking Database, and The Harvester.
  • Describe how Nmap is used to discover networks.
  • Use Nmap
  • Install and setup OpenVAS, describe the features of OpenVAS GUI
  • Research vulnerability and exploit sites.
  • Identify the severity of vulnerabilities.
  • Describe why it is important to verify patching.
  • Find the patch levels of various operating systems.
  • Define Hashing and the explain the password-cracking process.
  • Use command line.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.

Last Published Date: