SKILL BENCHMARK

541 Vulnerability Assessment Analyst Basic

  • 43m
  • 43 questions
Vulnerability Assessment Analyst Performs assessments of systems and networks within the network environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-indepth architecture against known vulnerabilities.

Topics covered

  • AD Enumeration, Mimikatz, and Pivoting Techniques
  • App Layer Attacks, Botnets, and DoS Countermeasures
  • Buffer Overflows, Privilege Escalation, and System Access
  • CEH v12: Risk Management, Cyber Threat Intelligence, and Threat Modeling
  • Cloud Computing, Containers, Hacking, and Security Controls
  • Cryptography, Algorithms, Implementations, and Tools
  • Cyber Kill Chain, TTPs, Behaviors, and Threat Hunting
  • Cybersecurity Concepts, Attacks, and Information Warfare
  • DoS, DDoS, Volumetric, and Protocol Attacks
  • Fileless Malware, Malware Analysis, and Countermeasures
  • Footprinting and Social Engineering Recon and Countermeasures
  • Footprinting, Google Dorks, Search Engines, and Subdomains
  • Hacking Methodology, MITRE ATT&CK Framework, and Diamond Model
  • Hijacking Concepts and Countermeasures
  • IDOR Attacks, File Inclusion Attacks, Web APIs, and Webhooks
  • Incident Management, ML, AI, and Regulations
  • Intrusion Detection and Prevention, Firewalls, and Honeypots
  • IoT Threats, Vulnerabilities, Attack Tools, and Countermeasures
  • Malware, Threats, Trojans, and Viruses
  • Mobile Hacking, OS Security, and Device Management
  • NetBIOS, SMB, SNMP, and LDAP Enumeration
  • Network Scanning, TCP, Host Discovery, and Port/Service Scanning
  • Nmap IDLE IPID, UDP, and SCTP Scans
  • Nmap TCP Scans
  • NTP, NFS, SMTP, and FTP Enumeration
  • Operational Technology Concepts, Attack Tools, and Countermeasures
  • Passwords Attacks, Extraction, and Cracking
  • PKI, Cryptanalysis, and Attack Countermeasures
  • Recon Tools and Tactics
  • Scan Optimization, OS Identification, and IDS/Firewall Evasion
  • Sniffing and Poisoning
  • Social Engineering, Insider Threats, and Identity Theft
  • SQL Injection and SQLMap
  • SQL Injection Concepts and Attacks
  • Steganography and Avoiding Detection
  • Vulnerability Assessment, Management, and Classification
  • Vulnerability Assessment Types, Models, Tools, and Reports
  • Web App Hacking Methodology, CSRF Attacks, and Input Filter Evasion
  • Web Application Attacks and Vulnerabilities
  • Web Server Hacking, Attacks, and Attack Methodologies
  • Windows Authentication
  • Wireless Concepts, Threats, and Hacking Tools
  • Wireless Hacking and Countermeasures

RECENTLY ADDED COURSES