Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.
Description
Fix the flaws in your network before attackers can find them. Learn how to use Nessus, the network automated vulnerability scanner, to detect and resolve system vulnerabilities.
Tags
Syllabus
Introduction
- Managing vulnerabilities with Nessus
- What you need to know
- Nessus editions
- Installing Nessus Manager on Linux
- Installing Nessus Manager on Windows
- Accessing the Nessus console
- What is vulnerability management?
- Identify scan targets
- Scan frequency
- Scan configuration
- Scan perspective
- Scanner maintenance
- Vulnerability Scanning Tools
- Report scan results
- Prioritize remediation
- Create a remediation workflow
- Barriers to vulnerability remediation
- SCAP
- CVSS
- Interpreting CVSS scores
- Analyzing scan reports
- Correlating scan results
- Server vulnerabilities
- Endpoint vulnerabilities
- Network vulnerabilities
- Virtualization vulnerabilities
- Industrial control systems
- Understanding cross-site scripting
- Preventing SQL injection
- Next steps
![](https://d3f1iyfxxz8i1e.cloudfront.net/courses/course_image/912acde87e41.jpeg)
Security Testing: Vulnerability Management with Nessus
Affiliate notice
-
TypeOnline Course
-
Provider
Fix the flaws in your network before attackers can find them. Learn how to use Nessus, the network automated vulnerability scanner, to detect and resolve system vulnerabilities.
Introduction
- Managing vulnerabilities with Nessus
- What you need to know
- Nessus editions
- Installing Nessus Manager on Linux
- Installing Nessus Manager on Windows
- Accessing the Nessus console
- What is vulnerability management?
- Identify scan targets
- Scan frequency
- Scan configuration
- Scan perspective
- Scanner maintenance
- Vulnerability Scanning Tools
- Report scan results
- Prioritize remediation
- Create a remediation workflow
- Barriers to vulnerability remediation
- SCAP
- CVSS
- Interpreting CVSS scores
- Analyzing scan reports
- Correlating scan results
- Server vulnerabilities
- Endpoint vulnerabilities
- Network vulnerabilities
- Virtualization vulnerabilities
- Industrial control systems
- Understanding cross-site scripting
- Preventing SQL injection
- Next steps
Tags
Loading...
Saving...
Loading...