CYB804 – 4.00 Hours

Currently there are no scheduled classes for this course. However, in some cases a course can be scheduled to meet your organization’s specific needs. For more information about this course or to schedule a class, please contact Knowledge Engineering at (800) 541-7149 or to get the latest schedule.

Course Description

Every organization has a unique set of cybersecurity risks which may include local and/or remote employees, computer software and hardware, vendor access, and/or the internet connected equipment necessary for business operations. This course covers key concepts, issues, and considerations for evaluating cybersecurity risks from an organizational perspective.


There are no prerequisites for this course.

Course Completion Requirements

Important information that you will need for this class:

  • You will need to have a reliable internet connection.
  • Your computer will need speakers or a headphone set to hear the audio.
  • A microphone is not required, but recommended because it will make participation easier for you.

Attendance Requirements

To meet attendance requirements, participants must review each training module and complete all required course assignments, activities, quizzes, and/or end of course exam.


  • Describe common methodologies for assessing cybersecurity vulnerabilities in enterprise IT networks
  • Discuss the development of a vulnerability management program.
  • Understand how to use commonly used tools to perform basic vulnerability assessments against a network, interpreting the results, and presenting remediation recommendations to management.

Suggested Audience

This course is designed for:

IT personnel, risk management and leadership of
businesses in all industries including, but not limited to, manufacturing, restaurant,
retail, banking, insurance and healthcare.

Contact Information

Knowledge Engineering
Phone: (979) 458-6710 | Toll-Free: (800) 541-7149

The course turned out to be even better than we envisioned. To be able to come together to gain more knowledge of incident command/unified command structure allowed for some real hands-on type training.

— Cathy Haynes, Charleston County, South Carolina
Back to top