Course Content
Module 2: Cybersecurity Strategy
0/1
Lesson 3: VA Overview
0/1
Module 4: Steps in Conducting Effective VA
0/1
Module 5: Pinpoint Mission Critical Data
0/1
Module 6: Applications and Data
0/1
Module 7: Hidden Data Sources
0/1
Module 8: Hardware
0/1
Module 9: Mapping Network Infra
0/1
Module 10: Identify Access Controls
0/1
Module 11: Vulnerability Scan
0/1
Module 12: Apply Business Concepts to Scanner Results
0/1
Vulnerability Assessment Fundamentals
    0% Complete