Description
Course info
Level
Intermediate
Updated
Sep 27, 2017
Duration
1h 47m
Description

At the core of vulnerability analysis is a thorough knowledge of the tool you'll use to discover vulnerabilities. In this course, Vulnerability Analysis with Nessus, you'll learn to build and prepare your targets for scanning. First, you'll discover how to install Nessus on both Windows and Linux. Next, you'll delve into how to create and customize your scans, and update the software even when you're offline. Finally, you'll explore how to scan web applications and configure advanced scan parameters based on the discovered targets. When you're finished with this course, you'll have foundational knowledge of vulnerability analysis using the Nessus tool that will help you moving forward to perform professional vulnerability assessments in an enterprise environment.

About the author
About the author

Kevin Cardwell provides consulting services for companies throughout the world and is an adviser to numerous government entities across the globe. He is an instructor, technical editor, and author for computer forensics and hacking courses. He is author of Building Virtual Pentesting Labs for Advanced Penetration Testing, first and second edition.

More from the author
Conducting Network Vulnerability Analysis
Intermediate
2h 28m
Jan 11, 2017
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi everyone. My name is Kevin Cardwell, and welcome to my course, Vulnerability Analysis with Nessus. I'm a freelance consultant, and for more than 25 years I have been conducting vulnerability assessments for clients around the world. I have assessed banks, as well as many government institutions. This course will teach you how to use Nessus to conduct a vulnerability assessment and to take the results of this and identify the risk to a system and/or network and mitigate this risk to an acceptable level. In this course, we're going to install Nessus on Windows and Linux, learn how to update Nessus when it is offline, customize Nessus policies to get maximum results, and perform web application scanning. By the end of this course, you'll know how to use Nessus to scan a variety of different targets and the process to customize your scans based on analysis of the threat environment. Before beginning the course, you should be familiar with networks and IP addresses, as well as virtualization concepts and vulnerability analysis concepts. From here, you should feel comfortable diving into security courses with courses on ethical hacking and penetration testing. I hope you'll join me on this journey to learn the critical skills for vulnerability assessments with the Vulnerability Analysis with Nessus course at Pluralsight.