Your experience on this site will be improved by allowing cookies
Discovery and Identification of Assets.
Categorization of Assets.
Assessment and Scanning.
Analysis and Reporting.
Remediation.
Verification (Re-scan).
Hands on Lab (Qualys or OpenVAS).
Going from ZERO Experience to becoming a “Cyber Security Vulnerability Management Analyst” earning a 6-figure Salary in less than 3 months.
The Package include:
- A complete working virtual machine Lab (OpenVAS) on client's laptop which can be used for professional engagements after the course (For Paid Clients).
- Reference Practical video tutorials.
- Reference reading materials.
- The 6 practical step process to master vulnerability management.
- Top 10 Assessment Guide Questions before a scan operation.
- Top 5 Analysis Guide Questions before generating a report.
- Monthly Online Practical Sessions.
- Unlimited in-course chat and discussions support.
Prerequisite:
- Computer/Laptop with internet connection.
- Software: Internet Browser, VirtualBox.
NOTE:
Monthly Group Practical Live Sessions.
Topics include:
STEP1 (First Session): Asset Discovery and Classification.
STEP2 (Second Session): Scanning Configurations and Scheduling.
STEP3 (Third Session): Report Analysis and Remediation.
For in-dept One-to-One Session to address your specific needs, Book a consulting time slot on our profile calendar.
Introduction to Vulnerability Management.
Vulnerability Assessment and Scanning.
Vulnerability Prioritization and Risk Assessment.
Vulnerability Remediation and Patch Management.
Vulnerability Management and Compliance.
Vulnerability Management Metrics and Reporting.
Vulnerability Management Tools and Technologies.
Vulnerability Management Challenges and Solutions.
Use these list of duties to update Your CV with a Job Role involving Vulnerability Accessment
Understanding Network Basic
Understanding IP Address
Understanding DNS (Domain Nmae System)
01 Vulnerability Management
02 VM Lifecycle and Cloud Platform Overview
03 VM Account Setup
04 Qualys KnowledgeBase
05 KnowledgeBase Search List
06 Vulnerability Assessment
07 Vulnerability Scanning
08 Scan Configuration Launching A Scan
09 View Scan Results
10 Scheduling Assessment Scans
11 Assets and Asset Inventory
12 Asset Groups
13 Using Asset Groups
14 Scan by Hostname
15 Asset Tags
16 Using Asset Tags
17 AssetView Connectors
18 Reporting Overview
19 Report Templates
20 Threat Protection
21 User Management
22 Remediation
23 Extended Mapping
0 Reviews
SUMMARY OF SKILLS: A multi-skilled Information Technology Expert and Arthur with 20+ years’ experience, excellent Communication, Project Management, Team Building, Analytical and Problem Management Skills. Fluent in English and French. A dedicated IT Career Coach, Mentor, and Trainer with passion for success.
Engaged in the business of giving expert advice to people interested in a professional or technical field related to Information Technology. With over 10 years experience in Training and Consulting, and a focus on helping people transition into IT careers in the shortest time possible, cyberWATCH is an online learning and coaching platform that offers a wide range of professional programs from expert instructors.
Send this course as a gift to your friends