ciso2ciso video series – JON GOOD – Nessus Vulnerability Scanner Tutorial (Cyber Security Tools)

How do you detect vulnerabilities that exist in a network or in a system?

The ability to identify vulnerabilities and track them throughout their life cycle is crucial to maintaining a secure network. According to CIS 20 controls, ongoing vulnerability management is the third most important and basic control you should have on your network. Unfortunately, vulnerability detection and vulnerability management can be two time-consuming processes in Cyber ​​Security. Fortunately, there are tools that we can use to automate the discovery process. Nessus is possibly the best known vulnerability analysis tool on the market. As a result, if there’s one scanner you should be familiar with, it’s Nessus.

In this video, we will discuss the Nessus Vulnerability Scanner. We’ll cover everything from the installation process and running your first vulnerability scan. I highly recommend that you follow him into his home lab to help him develop his skills with Nessus. Remember to only scan networks for which you have WRITTEN authorization to do so.

Practical vulnerability management:
Vulnerability management:
Security Risk Management:

0:00 ⏩ Introduction
1:25 ⏩ CIS Top 20 controls
2:28 ⏩ Introduction to Nessus
3:51 ⏩ Nessus installation
8:03 ⏩ Discovery exploration
8:31 ⏩ Basic Nessus scan
8:58 ⏩ Review the findings
10:49 ⏩ CVE findings
11:49 ⏩ Question of the day
12:03 ⏩ Final remarks

TenableNessus #VulnerabilityManagement #VulnerabilityScanner

One Comment

Leave a Reply

Your email address will not be published.