How do you detect vulnerabilities that exist in a network or on a system?
Make sure to subscribe so you don't miss new content!
https://www.youtube.com/channel/UCbbBt23LHt4WhjiWh67NJ3w?sub_confirmation=1
Looking to start a career in Information Security, Cyber Security, or Information Assurance? Check out all these resources to Get Started! https://www.jongood.com/getting-started/
Join my newsletter for a FREE copy of my eBook...Guide to Cyber Security Careers! https://www.jongood.com/newsletter/
The ability to identify vulnerabilities and to track them throughout their life cycle is crucial to maintaining a secure network. According to the CIS 20 Controls, Continuous Vulnerability Management is the third most important and basic control that you should have in your network. Unfortunately, vulnerability detection and vulnerability management can be two very time-consuming processes in Cyber Security. Luckily, there are tools that we can use to automate the discovery process. Nessus is arguably the most well-known vulnerability scanning tool in the market. As a result, if there is one scanner you should be familiar with then it’s Nessus.
In this video, we will walk through the Nessus Vulnerability Scanner. We will cover everything from the installation process and running your first vulnerability scan. I highly encourage you to follow along in your home lab to help build your skills with Nessus. Remember you should only scan networks that you have WRITTEN authorization to do so.
Practical Vulnerability Management: https://amzn.to/30JphEa
Vulnerability Management: https://amzn.to/2ZXhfbk
Security Risk Management: https://amzn.to/3jFjXtW
0:00 ⏩ Introduction
1:25 ⏩ CIS Top 20 Controls
2:28 ⏩ Nessus Introduction
3:51 ⏩ Nessus Installation
8:03 ⏩ Discovery Scan
8:31 ⏩ Basic Nessus Scan
8:58 ⏩ Review Findings
10:49 ⏩ CVE Findings
11:49 ⏩ Question of the Day
12:03 ⏩ Final Comments
#TenableNessus #VulnerabilityManagement #VulnerabilityScanner
Make sure to subscribe so you don't miss new content!
https://www.youtube.com/channel/UCbbBt23LHt4WhjiWh67NJ3w?sub_confirmation=1
Looking to start a career in Information Security, Cyber Security, or Information Assurance? Check out all these resources to Get Started! https://www.jongood.com/getting-started/
Join my newsletter for a FREE copy of my eBook...Guide to Cyber Security Careers! https://www.jongood.com/newsletter/
The ability to identify vulnerabilities and to track them throughout their life cycle is crucial to maintaining a secure network. According to the CIS 20 Controls, Continuous Vulnerability Management is the third most important and basic control that you should have in your network. Unfortunately, vulnerability detection and vulnerability management can be two very time-consuming processes in Cyber Security. Luckily, there are tools that we can use to automate the discovery process. Nessus is arguably the most well-known vulnerability scanning tool in the market. As a result, if there is one scanner you should be familiar with then it’s Nessus.
In this video, we will walk through the Nessus Vulnerability Scanner. We will cover everything from the installation process and running your first vulnerability scan. I highly encourage you to follow along in your home lab to help build your skills with Nessus. Remember you should only scan networks that you have WRITTEN authorization to do so.
Practical Vulnerability Management: https://amzn.to/30JphEa
Vulnerability Management: https://amzn.to/2ZXhfbk
Security Risk Management: https://amzn.to/3jFjXtW
0:00 ⏩ Introduction
1:25 ⏩ CIS Top 20 Controls
2:28 ⏩ Nessus Introduction
3:51 ⏩ Nessus Installation
8:03 ⏩ Discovery Scan
8:31 ⏩ Basic Nessus Scan
8:58 ⏩ Review Findings
10:49 ⏩ CVE Findings
11:49 ⏩ Question of the Day
12:03 ⏩ Final Comments
#TenableNessus #VulnerabilityManagement #VulnerabilityScanner
- Category
- Tech Education Channel
Be the first to comment