Tags
Language
Tags
May 2025
Su Mo Tu We Th Fr Sa
27 28 29 30 1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Practical Nessus Vulnerability Scanning

    Posted By: ELK1nG
    Practical Nessus Vulnerability Scanning

    Practical Nessus Vulnerability Scanning
    Published 5/2025
    MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
    Language: English | Size: 4.70 GB | Duration: 7h 24m

    Master Nessus Scanning Techniques with Real Labs and Step-by-Step Tutorials

    What you'll learn

    Understand the fundamentals of vulnerability management

    Install and configure Nessus on Windows and Linux

    Explore Nessus product editions, licensing, and user interface.

    Perform basic and advanced vulnerability scans using pre-built and custom scan templates.

    Understand and use scan policies, credentials, and plugin configurations effectively.

    Conduct authenticated and unauthenticated scans.

    Analyze scan results, generate detailed reports, and interpret vulnerability severity.

    Simulate real attacks by scanning vulnerable machines in a lab environment.

    Use Nessus for compliance checking.

    Create and manage scan policies, credentials, and plugin settings.

    Requirements

    Basic understanding of networking concepts.

    Familiarity with operating systems like Windows and Linux.

    Virtualization software like VMware Workstation and EVE NG.

    No prior experience with Nessus is required.

    A PC or laptop capable of running virtualization tools.

    Description

    Course Description:Are you ready to master one of the most powerful tools in vulnerability assessment?Welcome to Practical Nessus Vulnerability Scanning — a comprehensive, hands-on course designed to teach you how to effectively use Tenable Nessus, the industry-leading vulnerability scanner used by cybersecurity professionals around the world.Whether you're a cybersecurity beginner, network administrator, or a security analyst preparing for certifications like CEH, Security+, or OSCP, this course will help you build real-world skills to identify, assess, and report vulnerabilities in any environment.You'll gain hands-on experience by building a real-world lab using EVE-NG, configuring vulnerable targets, and performing both credentialed and non-credentialed scans. This course equips you with practical skills to identify, analyze, and mitigate vulnerabilities across a variety of operating systems and network devices.Who This Course is For:Cybersecurity students and IT professionals looking to upskillEthical hackers, SOC analysts, and penetration testersNetwork/system admins who want to enhance their organization’s securityAnyone interested in learning Nessus through real-world, practical examplesWhat You'll Learn:Introduction & Fundamentals:Start by understanding the core concepts of vulnerabilities and vulnerability management. Learn about the lifecycle of vulnerability handling, common vulnerabilities and exposures (CVE), and how to interpret risk using the Common Vulnerability Scoring System (CVSS). Dive into the Nessus ecosystem, exploring its product editions and licensing options.Lab Environment Setup with EVE-NG:Gain practical experience by setting up a full virtual lab environment using EVE-NG. You’ll install and configure Kali Linux, switches, Nessus lab images, and firewalls to simulate a realistic network topology — the perfect playground to test and scan.Installing Nessus:Get step-by-step guidance on obtaining the Nessus Essentials license and installing Nessus on multiple platforms, including Windows 11, Ubuntu Linux, and Kali Linux. Explore the web interface to get comfortable with its features and navigation.Scanning & Analysis:Master Nessus scanning with detailed lessons on scan templates, severity levels, and different scanning methods. Perform discovery scans like ping-only and host discovery, as well as OS identification. Understand the critical difference between credentialed and non-credentialed scans through practical labs.Advanced Scanning:Advance your skills with complex scanning techniques including Active Directory, FortiGate firewalls, and Cisco switches vulnerability assessments. Explore dynamic scans tailored for large and diverse networks.By the end of this course, you'll confidently perform vulnerability assessments using Nessus, interpret results accurately, and apply your skills in real-world security environments.

    Overview

    Section 1: Introduction

    Lecture 1 Course Introduction

    Lecture 2 Overview of Vulnerability

    Lecture 3 Vulnerability Management

    Lecture 4 Vulnerability Management Lifecycle

    Lecture 5 Common Vulnerabilities and Exposures

    Lecture 6 Common Vulnerability Scoring System

    Lecture 7 Exploring CVE and NVD Database

    Lecture 8 Introduction to Nessus

    Lecture 9 Nessus Product Editions & Licensing

    Section 2: Lab Environment Setup with EVE-NG

    Lecture 10 Installing EVE-NG for Virtual Lab

    Lecture 11 Adding Switches Images to EVE-NG

    Lecture 12 Adding Kali Linux 2025 to EVE NG

    Lecture 13 Convert Kali Linux 2025 VM

    Lecture 14 Add Nessus Lab Images to EVE-NG

    Lecture 15 Building Nessus Lab Topology

    Lecture 16 Importing Labs Into EVE-NG

    Lecture 17 Configuring Servers in the Lab

    Lecture 18 Setting Up External Devices

    Lecture 19 Firewall Configuration for Lab

    Section 3: Installing Nessus

    Lecture 20 Getting Nessus Essentials License

    Lecture 21 Install Nessus on Windows 11

    Lecture 22 Install Nessus on Linux Ubuntu

    Lecture 23 Install Nessus on Linux Kali

    Lecture 24 Web Interface Overview

    Section 4: Understanding Nessus Scans:

    Lecture 25 Scanning templates Categories

    Lecture 26 Understanding Severity Levels

    Section 5: Discovery Scans:

    Lecture 27 Ping-Only Discovery Overview

    Lecture 28 Ping-Only Discovery Lab

    Lecture 29 Host Discovery Scan Overview

    Lecture 30 Host discovery Scan Lab

    Lecture 31 OS Identification Lab

    Section 6: Network Scanning:

    Lecture 32 Basic Network Scan Overview

    Lecture 33 Basic Network Scan Lab

    Section 7: Credentialed & Non-Credentialed Scans:

    Lecture 34 Credential Validation Overview

    Lecture 35 Credential Validation Lab

    Lecture 36 Credentialed & Non-Credentialed Scanning

    Lecture 37 Unauthenticated Scanning Lab

    Lecture 38 Prerequisite for Credentialed Scan

    Lecture 39 Authenticated Scanning Lab

    Section 8: Advanced & Targeted Scans:

    Lecture 40 Advanced Scan Overview

    Lecture 41 Active Directory Advanced Scan Lab

    Lecture 42 FortiGate Vulnerability Scan Lab

    Lecture 43 Cisco Switch Vulnerability Scan Lab

    Lecture 44 Advanced Dynamic Scan Overview

    Lecture 45 Advanced Dynamic Scan Lab

    Section 9: Web & Application Scans:

    Lecture 46 Malware and Web Application Scan

    Lecture 47 Web Application Test Lab

    Lecture 48 Active Directory Starter Scan

    Lecture 49 Overview of Vulnerabilities Tab

    Section 10: Policy Compliance:

    Lecture 50 Policy Compliance Auditing

    Lecture 51 Policy Compliance Auditing Lab

    Lecture 52 Template and Policy Overview

    Lecture 53 Create Custom Policy Lab

    Section 11: Reporting and Analysis:

    Lecture 54 Reports Overview

    Lecture 55 Reports Lab

    Ethical Hackers & Penetration Testers,Network admins and system engineers,Students preparing for security certifications,Cybersecurity beginners and IT professionals,Anyone interested in hands-on Nessus experience,Anyone Interested in Scanning