Author
Released
3/8/2019- Setting up Nessus on Linux and Windows
- Identifying scan targets and frequency
- Configuring vulnerability scans
- Reporting scan results
- Overcoming barriers to vulnerability remediation
Skill Level Beginner
Duration
Views
- [Mike Chapple] Hackers use automated tools to probe networks for vulnerabilities, seeking out a server, endpoint, router, or even a printer that's misconfigured or missing a patch. Once they find a single flaw, they can take control of that device and use it to stage a massive attack on a network. Security professionals must run their own automated scans to stay a step ahead of their adversary. Nessus is one of the most popular tools available for cybersecurity professionals, network engineers, and system administrators to conduct their own vulnerability scans. Nessus allows us to scan network devices and check them against the Nessus database containing thousands of known vulnerabilities. Once you've discovered a flaw with Nessus, you can fix it before attackers find it and exploit it to gain access to your network and information. In this course, you'll learn how to install and configure Nessus and run your own vulnerability scans. We'll cover interpreting results of those scans to safeguard your systems. Hi, I'm Mike Chapple, and I use Nessus almost every day. It's a fantastic tool and I'm looking forward to sharing it with you. Alright, let's get rolling.
Related Courses
-
Security Testing Essential Training
with Jerod Brennen2h 48m Beginner -
Security Testing: Nmap Security Scanning
with Mike Chapple1h 46m Intermediate -
CySA+ Cert Prep: 2 Vulnerability Management
with Mike Chapple1h 37m Intermediate -
Learning Cryptography and Network Security
with Lisa Bock1h 45m Intermediate
-
Introduction
-
1. Setting Up Nessus
-
Nessus editions2m 35s
-
-
2. Creating a Vulnerability Management Program
-
Identify scan targets5m 50s
-
Scan frequency5m 7s
-
3. Configuring and Executing Vulnerability Scans
-
Scan configuration6m 16s
-
Scan perspective5m 3s
-
Scanner maintenance3m 19s
-
Vulnerability Scanning Tools1m 37s
-
-
4. Remediating Vulnerabilities
-
Report scan results4m 43s
-
Prioritize remediation3m 46s
-
-
5. Analyzing Scan Results
-
SCAP2m 34s
-
CVSS2m 48s
-
Interpreting CVSS scores3m 22s
-
Analyzing scan reports3m 59s
-
Correlating scan results2m 33s
-
-
6. Common Vulnerabilities
-
Server vulnerabilities5m 18s
-
Endpoint vulnerabilities1m 44s
-
Network vulnerabilities4m 29s
-
Industrial control systems4m 36s
-
Preventing SQL injection5m 29s
-
-
Conclusion
-
Next steps30s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Managing vulnerabilities with Nessus