CS0-003 Coverage Checklist (2.1-2.5)
Direct objective coverage from the CompTIA CS0-003 vulnerability management domain.
- 2.1 Scanning methods and concepts: asset discovery (map scans, device fingerprinting), special considerations (scheduling, operations, performance, sensitivity, segmentation, regulatory requirements), internal vs. external, agent vs. agentless, credentialed vs. non-credentialed, passive vs. active, static vs. dynamic including reverse engineering and fuzzing, critical infrastructure (OT, ICS, SCADA), security baseline scanning, and industry frameworks (PCI DSS, CIS benchmarks, OWASP, ISO 27000 series).
- 2.2 Tool output analysis: network mapping (Angry IP Scanner, Maltego), web scanners (Burp Suite, ZAP, Arachni, Nikto), vulnerability scanners (Nessus, OpenVAS), debuggers (Immunity Debugger, GDB), multipurpose tools (Nmap, Metasploit, Recon-ng), and cloud infrastructure assessment (Scout Suite, Prowler, Pacu).
- 2.3 Prioritization: CVSS interpretation (attack vectors, complexity, privileges, user interaction, scope, confidentiality/integrity/availability impact), validation (true/false positives and negatives), context (internal/external/isolated), exploitability/weaponization, asset value, and zero-day handling.
- 2.4 Mitigation controls: cross-site scripting (reflected/persistent), overflow vulnerabilities (buffer/integer/heap/stack), data poisoning, broken access control, cryptographic failures, injection flaws, CSRF, directory traversal, insecure design, security misconfiguration, end-of-life components, identification/authentication failures, SSRF, RCE, privilege escalation, and LFI/RFI.
- 2.5 Response and management: compensating controls, control types (managerial/operational/technical, preventative/detective/responsive/corrective), patching/configuration management (testing, implementation, rollback, validation), maintenance windows, exceptions, risk treatment (accept/transfer/avoid/mitigate), policy/governance/SLO alignment, prioritization/escalation, attack surface management, secure coding practices, secure SDLC, and threat modeling.