Vulnerability Management
Download as PDF
Program Delivery
Degree Designation
Program Level
Program Type
College
School/Department(s)
Program Description
The basics of penetration testing constitute the core of this concentration. Students utilize a virtual lab to gain experience through hands-on lab exercises. Students learn to use the well-known open-source Metasploit computer security project to understand security vulnerabilities, study to use this tool for penetration testing, testing the control tools, and learn to conduct monitoring of an enterprise. Students are introduced to system security and vulnerability analysis, the most common system exploits and vulnerabilities, the system “pivoting” and client-side exploits. Students learn how to assess enterprise security controls and system vulnerability, and to document their findings. Students study the rules of engagement, and how to conduct legal and ethical security tests and vulnerability assessments using known open-source tools (Metasploit, John the Ripper, Wireshark) to understand security vulnerabilities as well as to use this tool for penetration testing, testing the control tools, and how to conduct monitoring of an enterprise. This certificate is designed for penetration testers, system security, and network administrators
When this certificate is taken along with the Cyber Basics and Human Aspects & Analytics certificates the student can apply to the Master of Science, Cybersecurity program to be awarded the M.S. degree. Contact the director of the program for details.
Additional Program Information
Admission Criteria
An understanding of the Microsoft Windows operating systems and a background in systems administration is helpful, but not required.
A bachelor's degree in any discipline from an accredited institution recognized by the U.S. Department of Education or an equivalent degree from a foreign institution, as evaluated by WES, IERF, or SpanTran.