SKILL BENCHMARK
541 Vulnerability Assessment Analyst Basic
- 43m
- 43 questions
Vulnerability Assessment Analyst Performs assessments of systems and networks within the network environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-indepth architecture against known vulnerabilities.
Topics covered
- AD Enumeration, Mimikatz, and Pivoting Techniques
- App Layer Attacks, Botnets, and DoS Countermeasures
- Buffer Overflows, Privilege Escalation, and System Access
- CEH v12: Risk Management, Cyber Threat Intelligence, and Threat Modeling
- Cloud Computing, Containers, Hacking, and Security Controls
- Cryptography, Algorithms, Implementations, and Tools
- Cyber Kill Chain, TTPs, Behaviors, and Threat Hunting
- Cybersecurity Concepts, Attacks, and Information Warfare
- DoS, DDoS, Volumetric, and Protocol Attacks
- Fileless Malware, Malware Analysis, and Countermeasures
- Footprinting and Social Engineering Recon and Countermeasures
- Footprinting, Google Dorks, Search Engines, and Subdomains
- Hacking Methodology, MITRE ATT&CK Framework, and Diamond Model
- Hijacking Concepts and Countermeasures
- IDOR Attacks, File Inclusion Attacks, Web APIs, and Webhooks
- Incident Management, ML, AI, and Regulations
- Intrusion Detection and Prevention, Firewalls, and Honeypots
- IoT Threats, Vulnerabilities, Attack Tools, and Countermeasures
- Malware, Threats, Trojans, and Viruses
- Mobile Hacking, OS Security, and Device Management
- NetBIOS, SMB, SNMP, and LDAP Enumeration
- Network Scanning, TCP, Host Discovery, and Port/Service Scanning
- Nmap IDLE IPID, UDP, and SCTP Scans
- Nmap TCP Scans
- NTP, NFS, SMTP, and FTP Enumeration
- Operational Technology Concepts, Attack Tools, and Countermeasures
- Passwords Attacks, Extraction, and Cracking
- PKI, Cryptanalysis, and Attack Countermeasures
- Recon Tools and Tactics
- Scan Optimization, OS Identification, and IDS/Firewall Evasion
- Sniffing and Poisoning
- Social Engineering, Insider Threats, and Identity Theft
- SQL Injection and SQLMap
- SQL Injection Concepts and Attacks
- Steganography and Avoiding Detection
- Vulnerability Assessment, Management, and Classification
- Vulnerability Assessment Types, Models, Tools, and Reports
- Web App Hacking Methodology, CSRF Attacks, and Input Filter Evasion
- Web Application Attacks and Vulnerabilities
- Web Server Hacking, Attacks, and Attack Methodologies
- Windows Authentication
- Wireless Concepts, Threats, and Hacking Tools
- Wireless Hacking and Countermeasures