Vulnerability Scanning With Nessus For Penetration Testing
Last updated 8/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 335.96 MB | Duration: 0h 47m
Last updated 8/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 335.96 MB | Duration: 0h 47m
Learn to hack computers and networks with Tenable Nessus and secure them like security experts!
What you'll learn
How to Setup a Lab Environment
Penetration Testing
Penetration Testing Methodology
Tenable Nessus Installation
Tenable Nessus Setup
Tenable Nessus Overview
Tenable Nessus Vulnerability Scanning
Tenable Nessus Exploitation
Reporting
Exploiting Metasploitable 2
Requirements
Fundamental computer knowledge would be helpful but is not required
Description
Welcome to your Vulnerability Scanning with Tenable Nessus & Penetration Testing course! Throughout this course, you will learn techniques that hackers use to attack and penetrate computers and networks. You will learn Cyber Security, Ethical Hacking, Penetration Testing, and Nessus. You will learn about ethical hacking and penetration testing. You will also discover just how easy a cyber criminal could break into your own network. Furthermore, you will gain a comprehensive understanding of cyber attacks. After understanding how a hacker thinks and performs an attack, you will instantly be able to better defend your own computer and network from hackers. You will learn the importance of security along with highly desired skills that could boost your career. How would you like to land a job that pays you to ethically hack and perform penetration tests from your very own house?Do you value the privacy of your own home network? Imagine the comforting feeling that your computer and network is more secure from attacks because you know how to test the strength of your own computer and network using the amazing skills that you learned in this course. Act now to protect your wealth before it is too late and you become victim to another cyber attack.This course covers a broad range of cybersecurity, ethical hacking and penetration testing topics.
Overview
Section 1: Nessus 101 Overview
Lecture 1 Nessus 101 Overview
Section 2: Legal Concerns
Lecture 2 Legal Concerns
Section 3: Lab Environment Setup
Lecture 3 Lab Environment Setup
Lecture 4 Additional Content: How to Install & Use Tilix
Section 4: Tenable Nessus Introduction
Lecture 5 Introduction to Tenable Nessus
Lecture 6 Use Cases of Nessus
Section 5: Downloading & Installing Nessus
Lecture 7 Downloading & Installing Nessus
Section 6: Nessus GUI Overview
Lecture 8 Starting the Nessus Service
Lecture 9 Nessus Scan Templates
Section 7: Vulnerability Scanning & Discovery Scanning with Nessus
Lecture 10 Nessus Discovery Scan
Lecture 11 Nessus Vulnerability Scan
Section 8: Hacking with Nessus Scan Results
Lecture 12 Nessus Scan Results
Lecture 13 Nessus 19506 Plugin
Lecture 14 Nessus Scan Result Findings
Section 9: Reporting with Nessus
Lecture 15 Nessus Reporting
Section 10: Lab: Vulnerability Scanning with Nessus
Lecture 16 Lab: Vulnerability Scanning with Nessus
Section 11: Exploitation Example from Metasploit 201 Course
Lecture 17 Exploitation Example from Metasploit 201 Course
Section 12: Key Takeaways
Lecture 18 Key Takeaways
Section 13: Additional Content: How to Use Tilix in Kali Linux for Ethical Hacking
Lecture 19 How to Use Tilix on Kali Linux
Ethical hackers,Penetration testers,Security enthusiasts,Anyone interested in expanding their security knowledge,Individuals wanting to learn ethical hacking,Anyone interested in learning penetration testing,Anyone looking to start or further their career in cybersecurity