Video description
Nessus is a vulnerability scanner that helps security professionals identify and remediate potential vulnerabilities in their network, applications, and infrastructure with a wide range of features, including vulnerability scanning, compliance management, and reporting, to help organizations assess their security and mitigate risks.
This course provides the knowledge and skills needed to use Nessus effectively. We will start with the basics, such as installing and setting up Nessus, and then move on to more advanced topics such as customizing scans and automating security testing. We will differentiate Nessus Essentials versus Nessus Professional and understand automated vulnerability scanning. You will learn to write custom professional reports and learn tips and tricks to handle Nessus well. We will explore the concept of second opinion scanning and differentiate unauthenticated and authenticated scans. We will explore network and web application scans and import results of Nmap in Nessus; we will create a VA Project Worksheet and explore vulnerability scanning with Metasploit. You will learn to manually analyze and rank vulnerabilities.
By the end of this course, you will have learned everything needed to perform a complete vulnerability assessment independently using Nessus and identify, analyze, and rank security vulnerabilities.
What You Will Learn
- Explore unauthenticated/authenticated scans and network/web app scans
- Automate vulnerability scanning and write custom professional reports
- Understand the concepts of second opinion scanning
- Learn and perform a vulnerability scanning using Metasploit
- Learn to import the results of Nmap in Nessus
- Analyze/rank vulnerabilities and create a VA Project Worksheet
Audience
This course is designed to deliver content for penetration testers looking to build deeper knowledge of Nessus, cybersecurity enthusiasts desiring to learn more about vulnerability assessments, and freelancers wishing to add an in-demand skill to their profile. The prerequisites for the course include a computer/device with Windows/OSX/Linux. No programming or hacking knowledge is required. The ability to Google using intermediate to advanced skills for obtaining information is desirable.
About The Author
Avinash Yadav: Avinash Yadav is a young information security expert with a special focus on cybersecurity management as well as double-blind penetration testing. He brings his experience to the table through his passion for teaching. He has authored a couple of online courses with well-curated concepts and practicals on penetration testing and information security that the students can pursue to build up skills that are needed to be able to work in the cybersecurity domain rather than just focusing on random sources of information.
He looks forward to helping aspiring students on their journey to explore penetration testing, ethical hacking, and information security to become the person they would want to be, in an arguably short period of time!
Table of contents
- Chapter 1 : Welcome to the Course
- Chapter 2 : Setting Up the Laboratory
- Chapter 3 : Basics of Vulnerability Analysis
-
Chapter 4 : Each Tab of Nessus In-Depth
- Let's Get an 10,000 Foot Overview of Nessus
- How to Use Folders of Nessus (My Scans, All Scans, and Trash)
- Practical: Running a Basic Nessus Scan on a Real Machine
- Practical: Host Discovery Scan and OS Identification Scan
- How to use Resources of Nessus (Policies and Plugin Rules)
- How to Use Settings of Nessus
- See How I Analyze Results of a Done Nessus Scan (Nobody Will Teach You This!)
-
Chapter 5 : Nessus for Real-Life Scenarios
- How to Use Nessus Policies (Reusable Scans)
- How to Use Compliance Templates
- How to Use Web Application Scanner
- How to Do Authenticated (Credentialed) Scans
- Vulnerability Scanning with Metasploit
- Nmap and VEGA Tutorial - Alternative to Nessus but Free
- The Amazing Nessusd.Rules File Nobody Explains
- 4 Nessus PRO ONLY Features You Should Know
- Chapter 6 : Writing Fully Custom Reports
Product information
- Title: Nessus Scanner - Network Scanning from Beginner to Advanced
- Author(s):
- Release date: May 2023
- Publisher(s): Packt Publishing
- ISBN: 9781805127321
You might also like
video
The Absolute Beginners Guide to Cyber Security 2023 - Part 1
Cyber security applies technologies, processes, and controls to protect systems, networks, programs, devices, and data from …
video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced
Are you looking to pursue a career in cybersecurity and want to master the art of …
video
Certified Ethical Hacker (CEH) Complete Video Course, 3rd Edition
13+ Hours of Video Instruction Designed to help you pass the EC-Council Certified Ethical Hacker (CEH) …
video
CCNA 200-301
More Than 16 Hours of Video Instruction Overview CCNA 200-301 Complete Video Course is a comprehensive …