Logo

Maxtrain.com - [email protected] - 513-322-8888 - 866-595-6863

M2-CVAMOD

Certified Vulnerability Assessor On-Demand

Description

The Certified Vulnerability Assessor 3 day instructor led training class helps students understand the importance of vulnerability assessments by:

  • Giving you special knowledge and skills in Vulnerability Assessment.
  • Preparing you to apply this knowledge and exercise these skills in the interest of others.
  • Helping you understand the importance of a Vulnerability Assessment and how it can help you prevent serious break-ins to your organization.

This is accomplished by:

  • Learning a methodology using conceptual and real world repetition.
  • Equipping you with the knowledge about what hackers look for when trying to hack into your network.
  • Assessing for the cause of testing your company’s security posture to help better secure the infrastructure against hackers and or viruses, etc.

Mile2 is Accredited by the NSA-CNSS, Approved on Homelands Security NICCS Framework, and is on the FBI’s Tier 1-3 Certification Training Chart.

Self-Study Package includes (1-year access):

  1. Online Video
  2. Electronic Book (Workbook)
  3. A Prep Guide to passing the CISSP Exam
  4. Exam
  5. Exam Simulator
  6. Exam Prep Questions
  7. Online Exam Prep Video

Outline

Module 1 - Why Vulnerability Assessment?

• Overview
• What is a Vulnerability Assessment?
• Vulnerability Assessment
• Benefits of a
• Vulnerability Assessment
• What are Vulnerabilities?
• Security Vulnerability Life Cycle
• Compliance and Project Scoping
• The Project Overview Statement
• Project Overview Statement
• Assessing Current Network Concerns
• Vulnerabilities in Networks
• More Concerns
• Network Vulnerability
• Assessment Methodology
• Network Vulnerability
• Assessment Methodology
• Phase I: Data Collection
• Phase II: Interviews, Information Reviews, and Hands-On Investigation
• Phase III: Analysis
• Analysis cont.
• Risk Management
• Why Is Risk Management Difficult?
• Risk Analysis Objectives
• Putting Together the Team and Components
• What Is the Value of an Asset?
• Examples of Some Vulnerabilities that Are
• Not Always Obvious
• Categorizing Risks
• Some Examples of Types of Losses
• Different Approaches to Analysis
• Who Uses What?
• Qualitative Analysis Steps
• Quantitative Analysis
• ALE Values Uses
• ALE Example
• ARO Values and Their Meaning
• ALE Calculation
• Can a Purely Quantitative Analysis Be Accomplished?
• Comparing Cost and Benefit
• Countermeasure Criteria
• Calculating Cost/Benefit
• Cost of a Countermeasure
• Can You Get Rid of All Risk?
• Management’s Response to Identified Risks
• Liability of Actions
• Policy Review (Top-Down) Methodology
• Definitions
• Policy Types
• Policies with Different Goals
• Industry Best Practice Standards
• Components that Support the Security Policy
• Policy Contents
• When critiquing a policy
• Technical (Bottom-Up) Methodology
• Review

Module 2 - Vulnerability Types

• Overview
• Critical Vulnerabilities
• Critical Vulnerability Types
• Buffer OverFlows
• URL Mappings
• to Web Applications
• IIS Directory Traversal
• Format String Attacks
• Default Passwords
• Misconfigurations
• Known Backdoors
• Information Leaks
• Memory Disclosure
• Network Information
• Version Information
• Path Disclosure
• User Enumeration
• Denial of Service
• Best Practices
• Review

Module 3 - Assessing the Network

• Overview
• Network Security Assessment Platform
• Virtualization Software
• Operating Systems
• Exploitation Frameworks
• Internet Host and Network Enumeration
• Querying Web & Newsgroup Search Engines
• Footprinting tools
• Blogs & Forums
• Google Groups/USENET
• Google Hacking
• Google and Query Operators
• Google (cont.)
• Domain Name Registration
• WHOIS
• WHOIS Output
• BGP Querying
• DNS Databases
• Using Nslookup
• Dig for Unix / Linux
• Web Server Crawling
• Automating Enumeration
• SMTP Probing
• SMTP Probing cont.
• NMAP: Is the Host on-line
• ICMP Disabled?
• NMAP TCP Connect Scan
• TCP Connect Port Scan
• Nmap (cont.)
• Tool Practice : TCP
• half-open & Ping Scan
• Half-open Scan
• Firewalled Ports
• NMAP Service Version Detection
• Additional NMAP Scans
• NMAP UDP Scans
• UDP Port Scan
• Null Sessions
• Syntax for a Null Session
• SMB Null Sessions &
• Hardcoded Named Pipes
• Windows Networking Services Countermeasures
• Review

Module 4 - Assessing Web Servers

• Web Servers
• Fingerprinting Accessible Web Servers
• Identifying and Assessing
• Reverse Proxy Mechanisms
• Proxy Mechanisms
• Identifying Subsystems
• and Enabled Components
• Basic Web Server Crawling
• Web Application Technologies Overview
• Web Application Profiling
• HTML Sifting and Analysis
• Active Backend Database Technology Assessment
• Why SQL “Injection”?
• Web Application Attack Strategies
• Web Application Vulnerabilities
• Authentication Issues
• Parameter Modification
• SQL Injection: Enumeration
• SQL Extended Stored Procedures
• Shutting Down SQL Server
• Direct Attacks
• SQL Connection Properties
• Attacking Database Servers
• Obtaining Sensitive Information
• URL Mappings to Web Applications
• Query String
• Changing URL Login Parameters
• URL Login Parameters Cont.
• IIS Directory Traversal
• Cross-Site Scripting (XSS)
• Web Security Checklist
• Review

Module 5 - Assessing Remote VPN Services

• Assessing Remote & VPN Services
• Remote Information Services
• Retrieving DNS Service Version Information
• DNS Zone Transfers
• Forward DNS Grinding
• Finger
• Auth
• NTP
• SNMP
• Default Community Strings
• LDAP
• rwho
• RPC rusers
• Remote Maintenance Services
• FTP
• SSH
• Telnet
• X Windows
• Citrix
• Microsoft Remote
• Desktop Protocol
• VNC
• Assessing IP VPN Services
• Microsoft PPTP
• SSL VPNs
• REVIEW

Module 6 - Vulnerability Tools of the Trade

• Vulnerability Scanners
• Nessus
• SAINT – Sample Report
• Tool: Retina
• Qualys Guard
• Tool: LANguard
• Microsoft Baseline Analyzer
• MBSA Scan Report
• Dealing with Assessment Results
• Patch Management Options
• Review

Module 7 – Output Analysis

• Overview
• Staying Abreast: Security Alerts
• Vulnerability Research Sites
• Nessus
• SAINT
• SAINT Reports
• GFI Languard
• GFI Reports
• MBSA
• MBSA Reports
• Review

PreRequisites

Basic networking understanding

Audience

  • Information System Owners
  • Analysts
  • Ethical Hackers
  • ISSO’s
  • Cyber Security Managers
  • IT Engineer
$950.00 List Price


MAX Educ. Savings
Category:
Loading ...