
As cyber threats evolve, so must our defense strategies. This workshop offers streamlined, practical training on vulnerability assessment and management tailored for modern enterprises.
Live Training $25 - $150
Course Length: 4 Hours
Includes a Certificate of Completion
Next scheduled date: September 26th, 2025 @ 11:00 AM EDT
Description
As cyber threats evolve, so must our defense strategies. This workshop offers streamlined, practical training on vulnerability assessment and management tailored for modern enterprises.
Covering key topics such as threat management, vulnerability assessment frameworks, and dynamic security programs, attendees will gain hands-on experience with industry-standard tools and methodologies.
This workshop is designed to be hands on in nature, incorporating multiple lab exercises focused on vulnerability discovery with tools such as Sirius Scan and Nuclei.
By the end of the workshop, participants will be equipped to engage with vulnerabilities at a tactical level. Attendees will discover system vulnerabilities through multiple mechanisms to include custom scanning and development of Nmap Scripting Engine, Sirius, and Nuclei scripts.
System Requirements
-
Student/Lab Requirements:
- All VMs and labs will be accessed through the training portal: training.opensecurity.com
- VM access will be through a cloud hosted range environment that is accessible via the user’s browser
Syllabus
-
- What is Vulnerability Assessment?
-
- The Vulnerability Assessment Framework
-
- Discovery
- OSI Model discovery opportunity analysis
- Network-based discovery
- Sirius Scan
- RunZero
- Operational Technology (OT) discovery
- Active vs Passive Discovery
-
- Cloud discovery
-
- Cloud presence scanning
-
- SpiderfootHX and more
-
- Cloud presence scanning
-
- GitHub sensitive artifact scanning
-
- Cloud discovery
- Discovery
-
- Lab: Network and Cloud Discovery
-
- Case Study: Hybrid-Cloud Ransomware Breach of a Operational Technology Software as a Service Vendor
-
- Vulnerability Scanning
- General-Purpose and Application-Specific Scanning
- Sirius Scan
- Nuclei
- Lab: General-Purpose Vulnerability Scanning
- Authenticated Scanning
- Scan policy and account management
- Privileged Access Management Integration
- Agent-based scanning
- EDR and endpoint agent scanners
-
- Lab: Credentialed Scanning with Agents
- General-Purpose and Application-Specific Scanning
- Vulnerability Scanning
-
- Validation
- Calculating risk
- Understanding confidence metrics
-
- Vulnerability Data Management Solutions
- DefectDojo
- Brinqa
- ServiceNow
-
- More
- Vulnerability Data Management Solutions
- Validation
-
- Lab: Enterprise Vulnerability Management with DefectDojo
-
- Vulnerability Assessment to Vulnerability Management Cycle
-
- Conclusions
FAQ
As this is a lab-oriented, specialized, and technical course, functional knowledge of information security concepts, technology, and networking is highly recommended
About the Instructor

Matt Toussain
Bio
Matthew Toussain is the Founder and CIO of Open Security, an information security consulting firm specializing in end-to-end cybersecurity services. Matt served as the senior cyber tactics development lead for the U.S. Air Force and worked as a security analyst for Black Hills Information Security and CounterHack Challenges. As a former SANS instructor and current member of IANS faculty Matthew regularly delivers educational seminars to security practitioners around the world.
Register for Upcoming
-
Filter by Product Date
-
Filter by Product Instructor
-
Filter by Product Type
Workshop: Tactical Vulnerability Assessment with Matt Toussain
Complete Package
Live Training Matt Toussain
Virtual
Certificate of participation, six months access to class recordings and our appreciation.
Pay Forward What You Can
Live Training Matt Toussain
Virtual
Certificate of participation, six months access to class recordings and our appreciation.Certificate of participation, six months access to class recordings and our appreciation.
Pay Forward What You Can
Live Training Matt Toussain
Virtual
Certificate of participation, six months access to class recordings and our appreciation.
Pay Forward What You Can
Live Training Matt Toussain
Virtual
Certificate of participation, six months access to class recordings and our appreciation.
Pay Forward What You Can
Live Training Matt Toussain
Virtual
Certificate of participation, six months access to class recordings and our appreciation.
Similar Courses
-
Multiple InstructorsLive
Assumed Compromise: A Methodology with Detections and Microsoft Sentinel with Alyssa Snow and Kaitlyn Wimberley
View Course -
Multiple InstructorsLive
Workshop: Rapid Endpoint Investigations with Patterson Cake
View Course -
Multiple InstructorsLive
Workshop: Introduction to IP Network with Chris Brenton
View Course This product has multiple variants. The options may be chosen on the product page -
Multiple InstructorsLive
Workshop: Telemetry to Tactics: A Hands-On Detection Engineering Workshop with Hal Denton
View Course This product has multiple variants. The options may be chosen on the product page