This course will teach you the best practices, methods, and procedures to use when deploying a large-scale enterprise scope vulnerability assessment using the Nexpose tool, plus learn how to strategize a plan for the effective investigation of targets.
All it takes is a review of the latest cybersecurity news and it is immediately clear that no matter what product or technology in use, there are still data breaches; therefore, the continued challenge is that of finding these weaknesses across the entire enterprise architecture. In this course, Investigate Network Targets with Nexpose, you’ll learn to create and test enterprise level vulnerability scans with the Nexpose Vulnerability Scanning Tool. First, you’ll explore and assess the large-scale deployment advanced scan configuration options. Next, you’ll discover and evaluate the different types of scan engines available within the Nexpose tool. Finally, you’ll learn how to prioritize and create custom scan schedules and efficiently leverage the advanced scanning characteristics and capabilities. When you’re finished with this course, you’ll have the skills and knowledge of how to Investigate Network Targets with Nexpose needed to scale to perform scans of large-scale enterprise networks.
Kevin Cardwell provides consulting services for companies throughout the world and is an adviser to numerous government entities across the globe. He is an instructor, technical editor, and author for computer forensics and hacking courses. He is author of Building Virtual Pentesting Labs for Advanced Penetration Testing, first and second edition.
Course Overview Hi, everyone. My name is Kevin Cardwell. Now welcome to my course, Investigate Network Targets with Nexpose. I am the president of Cyber2Labs, LLC. I've worked as a cybersecurity consultant for more than 25 years. All it takes is a review of the latest cybersecurity news, and it's immediately clear, though no matter what product and technology we use, there are still data breaches. Therefore, the continued challenge is that of finding these weaknesses across the entire enterprise architecture. This course is designed as a follow‑on to the other courses on vulnerability assessment within Pluralsight. In this course, you will look at the techniques of deploying the Nexpose tool across the enterprise. Some of the major topics that we will cover include setting your Nexpose to scan in accordance with the Federal Information Processing Standard, or FIPS, the procedures to harden systems from hardware attacks, the process to tune and set up scan policies for compliance assessment, prioritizing and customizing your scans. By the end of this course, you will know the process and procedures to configure and deploy scans across an enterprise architecture. Before beginning the course, you should be familiar with setting up sites and policies with the Nexpose tool. I hope you'll join me on the journey to learn Nexpose with the Investigate Network Targets with Nexpose course here, at Pluralsight.