http://opensecuritytraining.info/IntroductionToVulnerabilityAssessment.html
Teaches: The purpose of this course on Vulnerability Assessment is to demonstrate how to identify vulnerabilities in a computer network, determine how a cyber-attacker might exploit these vulnerabilities, and examine how the vulnerabilities might be mitigated. A methodology used by MITRE when conducting assessments. The methodology lays out an orderly approach for conducting a vulnerability assessment and demonstrates numerous tools and techniques in an isolated computer laboratory setting to examine such problems through penetration testing.
Course Objectives: