About the training
A vulnerability assessment analyst performs assessments of systems and networks within the network environment and identifies where those systems/networks deviate from acceptable configurations. This module will provide the learner with the necessary knowledge and tools to find and understand vulnerabilities before attackers can exploit them and to use appropriate tools and resources. On completion, the learner will be able to conduct assessments of threats and vulnerabilities, determine deviations from acceptable configurations, assess the level of risk and develop and/or recommend appropriate mitigation countermeasures.
A vulnerability assessment analyst performs assessments of systems and networks within the network environment and identifies where those systems/networks deviate from acceptable configurations. This module will provide the learner with the necessary knowledge and tools to find and understand vulnerabilities before attackers can exploit them and to use appropriate tools and resources. On completion, the learner will be able to conduct assessments of threats and vulnerabilities, determine deviations from acceptable configurations, assess the level of risk and develop and/or recommend appropriate mitigation countermeasures.
What you will learn
LO1 Critically evaluate and classify current and emerging vulnerabilities in computer systems.
LO2 Appraise and configure the tools and techniques used for conducting vulnerability scans to recognize vulnerabilities in computer systems.
LO3 Conduct a vulnerability assessment of a computer system and use analysis tools to categorize the vulnerabilities and potential exploits/attacks that may not
be identified using scanning techniques.
LO4 Examine the results of the vulnerability scans and analysis tools to determine insights about a computer systems threat environment and identify false
positives and highly exploitable vulnerabilities.
LO5 Critically assess and report on the results of a vulnerability assessment with the aim of evaluating an organization's preparedness against security attacks.
LO1 Critically evaluate and classify current and emerging vulnerabilities in computer systems.
LO2 Appraise and configure the tools and techniques used for conducting vulnerability scans to recognize vulnerabilities in computer systems.
LO3 Conduct a vulnerability assessment of a computer system and use analysis tools to categorize the vulnerabilities and potential exploits/attacks that may not
be identified using scanning techniques.
LO4 Examine the results of the vulnerability scans and analysis tools to determine insights about a computer systems threat environment and identify false
positives and highly exploitable vulnerabilities.
LO5 Critically assess and report on the results of a vulnerability assessment with the aim of evaluating an organization's preparedness against security attacks.
Training information
This course is ideal for ICT professionals or graduates with an honours degree in computing or in a cognate area (STEM) who wish to develop a career as a cybersecurity professional in a technical role. This is a highly technical course requiring basic networking knowledge to ensure success. Candidates who do not hold a computing degree and are currently working in the IT sector may be considered based on relevant academic qualifications or extensive work experience.
Course Contact: Dr George O'Mahony: GeorgeD.omahony@mtu.ie
This course is ideal for ICT professionals or graduates with an honours degree in computing or in a cognate area (STEM) who wish to develop a career as a cybersecurity professional in a technical role. This is a highly technical course requiring basic networking knowledge to ensure success. Candidates who do not hold a computing degree and are currently working in the IT sector may be considered based on relevant academic qualifications or extensive work experience.
Course Contact: Dr George O'Mahony: GeorgeD.omahony@mtu.ie