From the course: Security Testing: Vulnerability Management with Nessus

Managing vulnerabilities with Nessus - Nessus Tutorial

From the course: Security Testing: Vulnerability Management with Nessus

Start my 1-month free trial

Managing vulnerabilities with Nessus

- [Mike Chapple] Hackers use automated tools to probe networks for vulnerabilities, seeking out a server, endpoint, router, or even a printer that's misconfigured or missing a patch. Once they find a single flaw, they can take control of that device and use it to stage a massive attack on a network. Security professionals must run their own automated scans to stay a step ahead of their adversary. Nessus is one of the most popular tools available for cybersecurity professionals, network engineers, and system administrators to conduct their own vulnerability scans. Nessus allows us to scan network devices and check them against the Nessus database containing thousands of known vulnerabilities. Once you've discovered a flaw with Nessus, you can fix it before attackers find it and exploit it to gain access to your network and information. In this course, you'll learn how to install and configure Nessus and run your own vulnerability scans. We'll cover interpreting results of those scans to safeguard your systems. Hi, I'm Mike Chapple, and I use Nessus almost every day. It's a fantastic tool and I'm looking forward to sharing it with you. Alright, let's get rolling.

Contents