Network Vulnerability Scanning with OpenVAS

Before launching a penetration testing session, you must first assess the target network and its compute resources for known vulnerabilities. The OpenVAS suite is built to perform complete and effective vulnerability scans. Learn how it's done.
Course info
Level
Intermediate
Updated
Jul 31, 2020
Duration
55m
Table of contents
Description
Course info
Level
Intermediate
Updated
Jul 31, 2020
Duration
55m
Description

Greenbone Vulnerability Manager's OpenVAS vulnerability assessment suite brings together an actively curated database of vulnerabilities with powerful network scan and reporting tools. In this course, Network Vulnerability Scanning with OpenVAS, you’ll learn to test your infrastructure for dangerous vulnerabilities. First, you’ll install and configure OpenVAS on Kali Linux. Next, you’ll come to understand the roles played by each of the public vulnerability databases on which vulnerability scanning relies. Finally, you'll launch a range of scans against live targets, and make sense of the reports that your scans will generate. When you’re finished with this course, you’ll have the skills and knowledge of OpenVAS needed to better secure your servers and IT resources.

About the author
About the author

David taught high school for twenty years, worked as a Linux system administrator for five years, and has been writing since he could hold a crayon between his fingers. His childhood bedroom wall has since been repainted.

More from the author
More courses by David Clinton
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi, and welcome to my course, Network Vulnerability Scanning with OpenVAS. Securing network accessible IT resources, whether hosted locally or in the cloud, requires a wide range of skills. Prominent among them is vulnerability scanning, which directs modified hacking tools against your servers and routing equipment, looking to expose holes and broken configurations. Only when you're aware of your system's weaknesses will you be able to fix then. In this course, you're going to learn how to install, configure and deploy OpenVAS against your infrastructure to discover security holes that need plugging. Some of the major topics that we'll cover include understanding how to access and leverage publicly‑available vulnerability data resources, configuring and running effective scans, and interpreting and sharing the data that comes out the other end. By the end of this course, you'll know how to install and administrate OpenVAS on Kali Linux, how to scan for the presence of any of the tens of thousands of known vulnerabilities, and how to generate and share useful reports with the people who need to see them. Before beginning the course, you should be familiar with the basics of TCP/IP networking and Linux server administration. I hope you'll join me on this journey to learn about vulnerability scanning with the Network Vulnerability Scanning with OpenVAS course, at Pluralsight.