Product Image

Certified Vulnerability Assessor (CVA)

The CVA course gives essential information on general VA instruments and also famous endeavors an IT specialist ought to be comfortable with.

Virtual

Learning Style

Course

Learning Style

Beginner

Difficulty

3 Days

Course Duration

Course Info

Download PDF

Certificate

See Sample

Timezone
tab
About Individual Course:
  • Individual course plan gives you access to this course
$2,500.00
/ Seat

You have already taken demo for this course.

If you want to get access to demo again, feel free to contact our support at (855) 800-8240

The CVA course gives essential information on general VA instruments and also famous endeavors an IT specialist ought to be comfortable with.

Course Information

About this course:

The course of Certified Vulnerability Assessor assists understudies with understanding the significance of weakness evaluations by giving unpredictable information and abilities in the Vulnerability Assessment field. The CVA course gives essential information on general VA instruments and also famous endeavors an IT specialist ought to be comfortable with.

The certification course of CVA is a fundamental cybersecurity course that targets on weakness assessments. The course of CVA aims around primary knowledge, for example, the significance of a Vulnerability Assessment and how it can enable a specialist to forestall genuine break-ins to your association. In the course of CVA, the understudy will be versed with basic viruses and malware and how they can penetrate a network of an association. Also, the learner will figure out how to asses the security posture of an organization and play out a fundamental vulnerability test to help secure the networking infrastructure of the organization.

The normal compensation for Certified Vulnerability Assessor is $63,000 every year.

Course Objective:

With the completion of this course, learners will have a working understanding of:

  • Have the information to recognize security vulnerabilities and hazard
  • Have information to precisely report their discoveries from assessments
  • Be prepared to sit for the CVA Exam
  • Benefits of a Vulnerability Assessment
  • Security Vulnerability Life Cycle
  • Compliance and Project Scoping
  • Project Overview Statement
  • The Project Overview Statement
  • Vulnerabilities in Networks
  • Network Vulnerability
  • Assessing Current Network Concerns
  • Network Vulnerability
  • Assessment Methodology
  • Assessment Methodology
  • Web Application Profiling
  • Web Application Technologies Overview
  • Active Backend Database Technology Assessment
  • HTML Sifting and Analysis
  • Remote Information Services
  • DNS Zone Transfers
  • Retrieving DNS Service Version Information
  • Assessing Remote & VPN Services
  • Forward DNS Grinding

Audience:

This course is planned for:

The learners who know nothing about security but want to. We prescribe this course for any individual who needs to be secure on the Internet, particularly representatives on duty.

Prerequisites:

Basic Computer Experience

An interest in security

Suggested prerequisites courses:

None

Outline

More Information

More Information
Subjects Information Security
Lab Access No
Technology VMware
Learning Style Virtual Classroom
Learning Type Course
Difficulty Beginner
Course Duration 3 Days
Language English
Cybersecurity Roles Cybersecurity analyst
Nice Workforce Categories Oversee and govern, Protect and defend, Securely provision

Reviews

Write Your Own Review
Only registered users can write reviews. Please Sign in or create an account

Course Expert:

Author

Paul Jackson

 

Paul has over 2 decades of of technical experience as a senior engineer, operations manager & project lead.
He has had hands-on impact within internal IT infrastructure, as well as in hundreds of unique customer environments that resulted in an in-depth knowledge of a wide range of security, identity, cloud, and infrastructure products & features; and a breadth of knowledge in associated network devices and applications.

His specialties include:

Identity, AD, Azure AD, Azure AD Connect, Azure MFA, ADFS, WAP, e-Gap, IAG, UAG, Firewalls, DirectAccess, Load balancers, PKI, Troubleshooting application and network issues, quickly learning new applications/technologies, building and leading tech teams, project management, creating scalable processes.

click here