**Course Description ** The Cybersecurity Vulnerability Assessment course is designed to address specific technical and professional skills needed to assess, document, remediate, and report on cybersecurity vulnerability assessments within organizations through a series of lectures and hands-on activities. Activities include examining, analyzing, and prioritizing assets, risks, and vulnerabilities to develop a vulnerability assessment report that could be delivered to organizational leadership. This course utilizes active discussions and activities to extend the participant’s understanding of vulnerability assessments.
Prerequisites There are no prerequisites for this course.
Enrollment Requirements Participants must be U.S. citizens. A FEMA Student ID is required to register for and participate in any training provided by FEMA agencies. All FEMA training providers, registration systems, and enrollment procedures are required to use this FEMA SID, which can be obtained at the following website: https://cdp.dhs.gov/femasidopens in a new tab; or with TEEX assistance upon arrival for class.
**Course Completion Requirements ** Photo identification on the first day of class. See the Participant Handbook for approved forms of identification and additional guidelines. Attend 80% of course hours Score 70% or better on the Post-Test
**Attendance Requirements ** Class attendance is an essential part of the education process and participants in TEEX courses are expected to attend all class sessions and field exercises. This course requires participants to attend a minimum of 80% of the class hours as a component of successful course completion. During the course, your instructor will review any additional attendance requirements, for example a field exercise that cannot be missed
Upon successful completion, you will be able to: Explain the elements of a vulnerability management program.? Conduct an asset inventory. Prioritize assets based on risk severity and other factors. Analyze a vulnerability assessment scan.? Identify corrective actions based on vulnerability scan results.? Develop a vulnerability assessment report.?
Suggested Audience The course is intended for State, Local, Tribal and Territorial, public, and private sectors:
IT and cybersecurity practitioners including:
Analysts Technicians Engineers Managers Computer-savvy risk managers and emergency managers who interact with IT/cybersecurity staff.?
4525 Education Park Dr
Schnecksville, PA 18078
United States