Vulnerability Assessment

1 Day Course
Hands On
Official IBM Curriculum

Book Now - 1 Delivery Method Available:

Classroom Virtual Classroom Private Group - Virtual Self-Paced Online


The Internet Scanner application provides automated network vulnerability assessment across servers, desktops, and infrastructure devices. Internet Scanner performs distributed or event-driven probes of network services, operating systems, routers/switches, servers, firewalls, and application routers to identify potential risks. Internet Scanner provides clear, concise risk management reports plus remediation advice and comprehensive trend analyses to support policy enforcement.

The Vulnerability Assessment training course introduces concepts, frameworks, methodologies and strategies that are effective in successfully using the Internet Scanner product. The course focuses on hands-on training supported by slide presentations, demonstrations, and lectures. The course starts with a general security and product overview. After developing an understanding of Internet Scanner and how it works in securing the network, the student develops scanning strategies, creates and modifies polices to fine-tune scans, and runs and analyzes reports.

Who Should Attend

Security professionals engaged in assessing security and securing information assets.

This course is in preparation for the Vulnerability Assessment exam.

Training Partners

We work with the following best of breed training partners using our bulk buying power to bring you a wider range of dates, locations and prices.


Course Content (12 topics)

  • Understanding the architecture and features in Internet Scanner 7.0
  • Understanding the structured scanning methodology and levels of security used by Internet Scanner
  • Understanding the implications and limitations of running a scan
  • Identifying the appropriate location for Internet Scanner on a network
  • Identifying best practices for scanning
  • Working with Internet Scanner reports to prioritize vulnerabilities and take corrective actions
  • Working with policies (using default policies; creating custom policies and FlexChecks; using baseline and reference policies) (Lab)
  • Creating and saving sessions to scan for security risks (Lab)
  • Using SmartScan to penetrate further into network vulnerabilities (Lab)
  • Generating and analyzing Internet Scanner reports (Lab)
  • Using FlexChecks (Lab)
  • Using Open Database Connectivity (Lab)


A working knowledge of TCP/IP and Windows platforms is required. Either one of the following two situations applies: - The training is NOT attended together with the “Introduction to SiteProtector” training: the attendees must have a valid Introduction to SiteProtector certification - The training is attended together with the “Introduction to SiteProtector” training: no further prerequisite

Additional Learning

The courses below may help you meet the knowledge level required to take this course. If you are unsure please ask a training advisor .

  • Introduction to SiteProtector

    This 2-day training course provides an Introduction to SiteProtector, providing concepts, methods and practices required to use the management tool.

    2 Day Course Hands On Training Official Curriculum Course Code ISS-SP
    Classroom Virtual Classroom Private Group - Virtual Self-Paced Online

Course PDF


Share this Course


Recommend this Course