Enterprise Threat and Vulnerability Assessment Training

Enterprise Threat and Vulnerability Assessment Training

Course Delivery

This Course is available in the following format:

Request this course in a different delivery format

GSA Schedule 70 Saving for Government Customers

Course Overview:

Enterprise Threat and Vulnerability Assessment Training – Hands-on

Enterprise Threat and Vulnerability Assessment Training begins with an introduction to information security vulnerability assessment fundamentals, followed by in-depth coverage of the Vulnerability Assessment Framework. It then moves into the structural components of a dynamic and iterative information security program. Through a detailed, practical analysis of threat intelligence, modeling, and automation, students will learn the skills necessary to not only use the tools of the trade, but also to implement a transformational security vulnerability assessment program.

Enterprise Threat and Vulnerability Assessment Training will teach you how to use real industry-standard security tools for vulnerability assessment, management, and mitigation. It is the only course that teaches a holistic vulnerability assessment methodology while focusing on challenges faced in a large enterprise. You will learn on a full-scale enterprise range chock full of target machines representative of an enterprise environment, leveraging production-ready tools, and a proven testing methodology .

This Enterprise Threat and Vulnerability Assessment Training course takes you beyond the checklist, giving you a tour of the attackers’ perspective that is crucial to discovering where they will strike. Operators are more than the scanner they employ. Enterprise Threat and Vulnerability Assessment Training emphasizes this personnel-centric approach by examining the shortfalls of many vulnerability assessment programs in order to provide you with the tactics and techniques required to secure networks against even the most advanced intrusions.

Customize it:

● We can adapt this Enterprise Threat and Vulnerability Assessment Training course to your group’s background and work requirements at little to no added cost.
● If you are familiar with some aspects of this course, we can omit or shorten their discussion.
● We can adjust the emphasis placed on the various topics or build the course around the mix of technologies of interest to you (including technologies other than those included in this outline).
● If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the course in manner understandable to lay audiences.

Audience / Target Group:

The target audience for this Enterprise Threat and Vulnerability Assessment Training course:

● Vulnerability Assessors
● Security Auditors
● Compliance Professionals
● Penetration Testers
● Vulnerability Program Managers
● Security Analysts
● Security Architects
● Senior Security Engineers
● Technical Security Managers
● System Administrators

Class Prerequisites:

The knowledge and skills that a learner must have before attending this Enterprise Threat and Vulnerability Assessment Training course are:

● Enterprise Threat and Vulnerability Assessment provides foundational concepts and skills useful throughout the SANS Penetration Testing and Vulnerability Assessment curriculum. The course rapidly accelerates the acquisition of knowledge by IT and information security professionals from a multitude of backgrounds. Nevertheless, as this is a lab-oriented, specialized, and technical course, functional knowledge of information security concepts, technology, and networking is highly recommended. Newcomers to the security community may find that, Hacker Tools, Techniques, Exploits, and Incident Handling provides a more accessible path to begin your journey.

Course Outline:

Methodology, Planning, and Threat Modeling

Maximizing Value from Vulnerability Assessments and Programs
Setting Up for Success at Scale: Enterprise Architecture and Strategy
Developing Transformational Vulnerability Assessment Strategies
Performing enterprise threat modelling
Generating Compounding Interest from Threat Intelligence and Avoiding Information Overload
The Vulnerability Assessment Framework
Overview of Comprehensive Network Scanning
Compliance Standards and Information Security


Active and Passive Reconnaissance
Identification and Enumeration with DNS
DNS Zone Speculation and Dictionary-Enabled Discovery
Port Scanning with Nmap and Zenmap
Scanning Large-Scale Environments
Commonplace Services
Scanning the Network Perimeter and Engaging the DMZ
The Windows Domain: Exchange, SharePoint, and Active Directory
Recruiting Disparate Data Sources: Patches, Hotfixes, and Configurations
Trade-offs: Speed, Efficiency, Accuracy, and Thoroughness
Introduction to PowerShell

Enhanced Vulnerability Scanning and Automation

Enhanced Vulnerability Scanning
Risk Assessment Matrices and Rating Systems
Quantitative Analysis Techniques Applied to Vulnerability Scoring
Performing Tailored Risk Calculation to Drive Triage
General Purpose vs. Application Specific Vulnerability Scanning
Tuning the Scanner to the Task, the Enterprise, and Tremendous Scale
Scan Policies and Compliance Auditing
Performing Vulnerability Discovery with Open-Source and Commercial Appliances
Nmap Scripting Engine and OpenVAS
Testing for Insecure Cryptographic Implementations Including SSL
Assessing VOIP Environments
Discovering Vulnerabilities in the Enterprise Backbone: Active Directory, Exchange, and SharePoint
Evaluating Vulnerability Risk in Custom and Unique Systems including Web Applications
Minimizing Supplemental Risk while Conducting Authenticated Scanning through Purposeful Application of Least Privilege
Probing for Data Link Liability to Identify Hazards in Wireless Infrastructure, Switches, and VLANs
Manual Vulnerability Discovery Automated to Attain Maximal Efficacy

Vulnerability Validation, Triage, and Data Management

Assigning a Confidence Value and Validating Exploitative Potential of Vulnerabilities
Manual Vulnerability Validation Targeting Enterprise Infrastructure
Converting Disparate Datasets into a Central, Normalized, and Relational Knowledge Base
Managing Large Repositories of Vulnerability Data
Querying the Vulnerability Knowledge Base
Triage: Assessing the Relative Importance of Vulnerabilities Against Strategic Risk

Remediation and Reporting

Team Operations and Collaboration
Security Operations Project Management Essentials
Transforming Triage Listing into the Vulnerability Remediation Plan
Developing the Cybersecurity Risk Sight Picture
Connecting Related Datasets and Framing the Narrative
Developing a Web of Network and Host Affiliations
Modeling Account Relationships on Active Directory Forests
Creating Effective Vulnerability Assessment Reports
Curbing the Vulnerability Lifecycle and Aspiring to Zero Hour
Closure: Be a Positive Influence in the Context of the Global Information Security Crisis

Vulnerability Assessment Foundry

Tactical Employment of the Vulnerability Assessment Framework
Threat Modeling
Vulnerability Scanning
Data Management and Triage

Whether you are looking for general information or have a specific question, we want to help!

Request More Information

Print Friendly, PDF & Email