Cybersecurity Vulnerability Assessment

MGT303 – 16.00 Hours

Currently there are no scheduled classes for this course. However, in some cases a course can be scheduled to meet your organization’s specific needs. For more information about this course or to schedule a class, please contact Business & Cyber Solutions at or [email protected] to get the latest schedule.

Course Description

The Cybersecurity Vulnerability Assessment course is designed to address specific technical and professional skills needed to assess, document, remediate, and report on cybersecurity vulnerability assessments within organizations through a series of lectures and hands-on activities. Activities include examining, analyzing, and prioritizing assets, risks, and vulnerabilities to develop a vulnerability assessment report that could be delivered to organizational leadership. This course utilizes active discussions and activities to extend the participant’s understanding of vulnerability assessments.  

Prerequisites

There are no prerequisites for this course.

Enrollment Requirements

Participants must be U.S. citizens. A FEMA Student ID is required to register for and participate in any training provided by FEMA agencies. All FEMA training providers, registration systems, and enrollment procedures are required to use this FEMA SID, which can be obtained at the following website: https://cdp.dhs.gov/femasid; or with TEEX assistance upon arrival for class.

Course Completion Requirements

  • Photo identification on the first day of class. See the Participant Handbook for approved forms of identification and additional guidelines.
  • Attend 80% of course hours
  • Score 70% or better on the Post-Test

Attendance Requirements

Class attendance is an essential part of the education process and participants in TEEX courses are expected to attend all class sessions and field exercises. This course requires participants to attend a minimum of 80% of the class hours as a component of successful course completion. During the course, your instructor will review any additional attendance requirements, for example a field exercise that cannot be missed

Upon successful completion, you will be able to:

  •   Explain the elements of a vulnerability management program.?
  •   Conduct an asset inventory.
  • Prioritize assets based on risk severity and other factors.
  • Analyze a vulnerability assessment scan.?
  • Identify corrective actions based on vulnerability scan results.?
  • Develop a vulnerability assessment report.?

Suggested Audience

The course is intended for State, Local, Tribal and Territorial, public, and private sectors: 

IT and cybersecurity practitioners including:?? 

  • Analysts 
  • Technicians 
  • Engineers 
  • Managers 

Computer-savvy risk managers and emergency managers who interact with IT/cybersecurity staff.? 

Contact Information

Business & Cyber Solutions
Phone: (979) 431-4837
Email: [email protected]