Cybersecurity Vulnerability Assessment
MGT303 – 16.00 Hours
Schedule
Details Buttons | Dates | Location | Class | Price | Register Buttons |
---|---|---|---|---|---|
01/15/25 – 01/16/25 | Honolulu, HI | EC MGT303 3 | Register |
This schedule is subject to change without notice. If you have not received confirmation of the class prior to the class start, please contact the division at or [email protected] to get the latest schedule.
Course Description
The Cybersecurity Vulnerability Assessment course is designed to address specific technical and professional skills needed to assess, document, remediate, and report on cybersecurity vulnerability assessments within organizations through a series of lectures and hands-on activities. Activities include examining, analyzing, and prioritizing assets, risks, and vulnerabilities to develop a vulnerability assessment report that could be delivered to organizational leadership. This course utilizes active discussions and activities to extend the participant’s understanding of vulnerability assessments.
Prerequisites
There are no prerequisites for this course.
Enrollment Requirements
Participants must be U.S. citizens. A FEMA Student ID is required to register for and participate in any training provided by FEMA agencies. All FEMA training providers, registration systems, and enrollment procedures are required to use this FEMA SID, which can be obtained at the following website: https://cdp.dhs.gov/femasid; or with TEEX assistance upon arrival for class.
Course Completion Requirements
- Photo identification on the first day of class. See the Participant Handbook for approved forms of identification and additional guidelines.
- Attend 80% of course hours
- Score 70% or better on the Post-Test
Attendance Requirements
Class attendance is an essential part of the education process and participants in TEEX courses are expected to attend all class sessions and field exercises. This course requires participants to attend a minimum of 80% of the class hours as a component of successful course completion. During the course, your instructor will review any additional attendance requirements, for example a field exercise that cannot be missed
Upon successful completion, you will be able to:
- Explain the elements of a vulnerability management program.
- Conduct an asset inventory.
- Prioritize assets based on risk severity and other factors.
- Analyze a vulnerability assessment scan.
- Identify corrective actions based on vulnerability scan results.
- Develop a vulnerability assessment report.
Suggested Audience
The course is intended for State, Local, Tribal and Territorial, public, and private sectors:
IT and cybersecurity practitioners including:
- Analysts
- Technicians
- Engineers
- Managers
Computer-savvy risk managers and emergency managers who interact with IT/cybersecurity staff.
Contact Information
Business & Cyber Solutions
Phone: (979) 431-4837
Email: [email protected]