Module 6: Vulnerabilities

Module 6 Description & Objectives


Vulnerabilities are weaknesses that enable threats to be actualized. This module discusses cybersecurity vulnerabilities in general and those that are of a higher concern for critical infrastructure systems. It also identifies processes and tools for discovering vulnerabilities.



  • Identify the common vulnerabilities associated with Control Systems (CS).
  • Identify SCADA cyber vulnerabilities.
  • Describe how an attacker may gain control of the SCADA system.
  • Define vulnerability assessment and explain why it is important.
  • Identify vulnerability assessment techniques and tools, such as CSET, Nessus, and other assessment tools.
  • Explain the differences between vulnerability scanning and penetration testing.



Icon for the Creative Commons Attribution 4.0 International License

Critical Infrastructure Cybersecurity by Whatcom Community College and CyberWatch West is licensed under a Creative Commons Attribution 4.0 International License, except where otherwise noted.

Share This Book