Skip to main content

Core 130: Vulnerability Management

  • Duration: 40 hours
  • Delivery Options: Online, In-person, Hybrid

Core 130 teaches the basics of vulnerability management concepts and analysis. You will learn topics like threat hunting, vulnerability scanning & reporting, vulnerability assessments, incident response, disaster recovery, application security, and more.

Who should take this course

Core 130 is designed for a general audience interested in learning about cyber and information security. While focused on those starting a career in cyber, this series is a great starting point for leaders who need to understand cyber. It is recommended that participants complete Core 110 or have at least six months of cybersecurity experience. 

How can you take this course

Online

Available online as either self-paced or live with an instructor

In-person

Available in-person either at Purdue or at your location.

Hybrid

Available as a combination of online and in-person

What tools you will use

This course introduces you to vulnerability tools such as DVWA, skipfish, PuTTY, and RATS.

What you can expect from Core 130: Vulnerability Management

The Common Exposures and Vulnerabilities database currently contains over 186,000 known vulnerabilities, with an average of 8000 added every four months. Core 130 teaches you an understanding of vulnerability management and response. The course covers vulnerability assessments, incident response, the cyber kill chain, and enterprise network threat hunting.

Key Takeaways

For Organizations:

  • Upskill current workforce  
  • Get hands-on with industry tools in virtual labs.
  • Perfect for I.T. and C-suite 

For Individuals

  • Gain an understanding of fundamental cyber concepts.
  • Get hands-on with industry tools in virtual labs.
  • Learn at your own pace online

Training

You can take Core 130 in various ways: self-paced online to in-person with a cyberTAP instructor. The course is divided into two primary sections: each consisting of lectures, readings, quizzes, self-assessments, and virtual labs. Core 130 is 40 credit hours, and you will earn a badge upon passing. 

Course Topics

Vulnerability Assessment: Learn the basics of vulnerability assessments, including testing, methodologies, scanning, documentation reviews, and threat hunting.  

Incident Response: Understand the foundations of identifying, containing, and recovering from a cyber attack.

Tech Requirements

It is recommended that all of cyberTAP courses be taken on a laptop or PC that runs either Windows or Linux as an operating system. We also recommended to have a fast and reliable internet access.

Are you interested in learning more?

cyberTAP's comprehensive approach to teaching cyber fundamentals and building practical skills through applied technical training is perfect for those interested in starting a new career, learning a new skill, experiencing a cyberattack firsthand, or making a team around cybersecurity. Our programs are fully customizable to offer a tailored solution for individual and corporate needs. Let's get in touch and see just how cyberTAP can partner with you and develop a training program just for you and your team. 

Get Started

Return to main content

Purdue University, 610 Purdue Mall, West Lafayette, IN 47907, (765) 494-4600

© 2021 Purdue University | An equal access/equal opportunity university | Copyright Complaints | Maintained by Technical Assistance Program

Trouble with this page? Disability-related accessibility issue? Please contact Technical Assistance Program at tap@purdue.edu.