Certified Vulnerability Assessor
The Certified Vulnerability Assessor course trains students to be proficient in conducting vulnerability assessments by: 1. Teaching the risk associated with information technology and why a vulnerability assessment is crucial to the continuing operations of a business. 2. Preparing students with the tools and knowledge of how to perform a vulnerability assessment. 3. Instructing students on how to summarize and report on their findings from a vulnerability assessment. Learn what vulnerabilities hackers look for when trying to hack into systems. After completing the course, students will be able to sit for the Certified Vulnerability Assessor exam. Upon passing the exam, students will be able to use the C)VA certification.
The C)VA is a course on cyber security designed for those who don’t know anything about security but need to. We recommend this course for anyone who wants to be secure on the Internet, especially employees at work.
After you complete the C)VA course and get certified, we recommend you to further develop your security skill-set by being certified as a C)ISSO: Certified Information Systems Officer, which will prepare you to advise businesses on security issues and implement solutions.
- An interest in security
- Basic Computer Experience
Learning Outcomes / Objectives
Upon successful completion of this course, students will:
- Have knowledge to detect security vulnerabilities and risk
- Have knowledge to accurately report on their findings from examinations
- Be ready to sit for the C)VA Exam
Continuing education: 24 CPE Credits
The Certified Vulnerability Assessor exam is taken on-line through Mile2’s Assessment and Certification System Mile2’s Assessment and Certification System (MACS), which is accessible on your mile2.com account. The exam will take 1 hour and consist of 25 multiple choice questions. The cost is $200 USD and must be purchased from the store on Mile2.com.
With 11 up-to-date Modules, the Certified Security Sentinel will teach you security best practices applicable to keeping the information you are entrusted with secure.
- Why Vulnerability Assessment
- Vulnerability Types
- Assessing the Network
- Assessing Web Servers & Applications
- Assessing Remote & VPN Services
- Vulnerability Assessment Tools
- Output Analysis