Description
Vulnerability Analysis (PD-WRL-007):
Responsible for assessing systems and networks to identify deviations from acceptable configurations, enclave policy, or local policy. Measure effectiveness of defense-in-depth architecture against known vulnerabilities.
Each component of this course is directly the related to the OPM 541
This course covers all of 64 knowledge statements using recorded sessions with corresponding readings, mindmaps and glossaries. Each session has up to four knowledge confirming quizzes.
It can be done as independent study with continual daily support from a live subject matter expert.
If you choose to do it as a part of a cohort of students: there are weekly scheduled live content Q&A’s.
This is part 1 of a full work role for vulnerability analysis.
Topic of the course:
Programming Language Structures and Logic
Computer Networking Protocols
Risk Management Processes
Cybersecurity Laws and Regulations
Cybersecurity Policies and Procedures
Privacy Laws and Regulations
Privacy Policies and Procedures
Cybersecurity Principles and Practices
Privacy Principles and Practices
Cybersecurity Threats
Cybersecurity Vulnerabilities
Cybersecurity Threat Characteristics
Access Control Principles and Practices
Authentication and Authorization Tools and Techniques
Common Application Vulnerabilities
Cryptographic Key Management Principles and Practices
Data Backup and Recovery Policies and Procedures
Enterprise Cybersecurity Architecture Principles and Practices
Host Access Control Systems and Software
Network Access Control Systems and Software
Confidentiality, Integrity and Availability Non-Repudiation Principles and Practices
Cyber Safety Principles and Practices
Identity and Access Management Principles and Practices
System Threats
System Vulnerabilities
Server Diagnostic Tools and Techniques
Fault Detection and Diagnostics Tools and Techniques
System Administration Principles and Practices
Enterprise Information Technology Architecture Principles and Practices
Systems Engineering Processes
Network Attack Characteristics
Defense-In-Depth Principles and Practices
Ethical Hacking Tools and Techniques
Interpreted and Compiled Programming Language Characteristics
Cyberattack Characteristics
Cyberattack Actor Characteristics
Hardening Tools and Techniques
Cyberattack Stages
Cyber Intrusion Activity Phases
Data Classification Standards and Best Practices
Data Classification Tools and Techniques
Enterprise Architecture Reference Models and Frameworks
Enterprise Architecture Principles and Practices
Industry Cybersecurity Models and Frameworks
Access Control Models and Frameworks
Ethical Hacking Principles and Practices
The Open Systems Interconnect Reference Model
Network Architecture Principles and Practices
Network Analysis Tools and Techniques
Data Classification Policies and Procedures
Packet-Level Analysis Tools and Techniques
Cryptology Principles and Practices
Penetration Testing Principles and Practices
Penetration Testing Tools and Techniques
Cyber-Attack Tools and Techniques
Computer Networking Principles and Practices
Network Security Principles and Practices
Risk Scoring Principles and Practices
Web Application Security Risks
Social Engineering Tools and Techniques
Cyber Defense Auditing Laws and Regulations
Cyber Defense Auditing Policies and Practices
Organizational Cybersecurity Policies and Configurations





