English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 1h 47m | 235 MB
It only takes one misconfigured device or missing patch for hackers to infiltrate your network. Fix the flaws in your systems before attackers can find them with Nessus, the network vulnerability scanner popular among cybersecurity analysts, sys admins, and network engineers. Using Nessus, you can scan servers, endpoints, and other network devices and check them against a database of thousands of known vulnerabilities. In this course, instructor Mike Chapple teaches you how to install Nessus, configure scans, and interpret the output. He explains how to create a vulnerability management program as well as a remediation workflow that will help you detect, understand, and resolve vulnerabilities before they are exploited.
Topics include:
- Setting up Nessus on Linux and Windows
- Identifying scan targets and frequency
- Configuring vulnerability scans
- Reporting scan results
- Overcoming barriers to vulnerability remediation
Table of Contents
1 Managing vulnerabilities with Nessus
2 What you need to know
3 Nessus editions
4 Installing Nessus Manager on Linux
5 Installing Nessus Manager on Windows
6 Accessing the Nessus console
7 What is vulnerability management
8 Identify scan targets
9 Scan frequency
10 Scan configuration
11 Scan perspective
12 Scanner maintenance
13 Vulnerability Scanning Tools
14 Report scan results
15 Prioritize remediation
16 Create a remediation workflow
17 Barriers to vulnerability remediation
18 SCAP
19 CVSS
20 Interpreting CVSS scores
21 Analyzing scan reports
22 Correlating scan results
23 Server vulnerabilities
24 Endpoint vulnerabilities
25 Network vulnerabilities
26 Virtualization vulnerabilities
27 Industrial control systems
28 Understanding cross-site scripting
29 Preventing SQL injection
30 Next steps
Resolve the captcha to access the links!