filmov
tv
Nessus Vulnerability Scanner Tutorial (Cyber Security Tools)
![preview_player](https://i.ytimg.com/vi/x87gbgQD4eg/maxresdefault.jpg)
Показать описание
How do you detect vulnerabilities that exist in a network or on a system?
The ability to identify vulnerabilities and to track them throughout their life cycle is crucial to maintaining a secure network. According to the CIS 20 Controls, Continuous Vulnerability Management is the third most important and basic control that you should have in your network. Unfortunately, vulnerability detection and vulnerability management can be two very time-consuming processes in Cyber Security. Luckily, there are tools that we can use to automate the discovery process. Nessus is arguably the most well-known vulnerability scanning tool in the market. As a result, if there is one scanner you should be familiar with then it’s Nessus.
In this video, we will walk through the Nessus Vulnerability Scanner. We will cover everything from the installation process and running your first vulnerability scan. I highly encourage you to follow along in your home lab to help build your skills with Nessus. Remember you should only scan networks that you have WRITTEN authorization to do so.
=============================
Today’s Video Sponsor
=============================
=============================
Popular Cybersecurity Resources
=============================
=============================
Cool Tech that I Use in My Studio
=============================
=============================
Connect with me!
=============================
⏰ Timecodes ⏰
0:00 Introduction
1:25 CIS Top 20 Controls
2:28 Nessus Introduction
3:51 Nessus Installation
8:03 Discovery Scan
8:31 Basic Nessus Scan
8:58 Review Findings
10:49 CVE Findings
11:49 Question of the Day
12:03 Final Comments
=============================
#TenableNessus #VulnerabilityManagement #VulnerabilityScanner
DISCLAIMER: I am an ambassador or affiliate for many brands referenced on the channel. As an Amazon Associate, I earn a commission from qualifying purchases.
DISCLAIMER (MUSIC): I only use royalty-free music and sound effects.
The ability to identify vulnerabilities and to track them throughout their life cycle is crucial to maintaining a secure network. According to the CIS 20 Controls, Continuous Vulnerability Management is the third most important and basic control that you should have in your network. Unfortunately, vulnerability detection and vulnerability management can be two very time-consuming processes in Cyber Security. Luckily, there are tools that we can use to automate the discovery process. Nessus is arguably the most well-known vulnerability scanning tool in the market. As a result, if there is one scanner you should be familiar with then it’s Nessus.
In this video, we will walk through the Nessus Vulnerability Scanner. We will cover everything from the installation process and running your first vulnerability scan. I highly encourage you to follow along in your home lab to help build your skills with Nessus. Remember you should only scan networks that you have WRITTEN authorization to do so.
=============================
Today’s Video Sponsor
=============================
=============================
Popular Cybersecurity Resources
=============================
=============================
Cool Tech that I Use in My Studio
=============================
=============================
Connect with me!
=============================
⏰ Timecodes ⏰
0:00 Introduction
1:25 CIS Top 20 Controls
2:28 Nessus Introduction
3:51 Nessus Installation
8:03 Discovery Scan
8:31 Basic Nessus Scan
8:58 Review Findings
10:49 CVE Findings
11:49 Question of the Day
12:03 Final Comments
=============================
#TenableNessus #VulnerabilityManagement #VulnerabilityScanner
DISCLAIMER: I am an ambassador or affiliate for many brands referenced on the channel. As an Amazon Associate, I earn a commission from qualifying purchases.
DISCLAIMER (MUSIC): I only use royalty-free music and sound effects.
Комментарии