How do you detect vulnerabilities that exist in a network or in a system?

The ability to identify vulnerabilities and track them throughout their life cycle is crucial to maintaining a secure network. According to CIS 20 controls, ongoing vulnerability management is the third most important and basic control you should have on your network. Unfortunately, vulnerability detection and vulnerability management can be two time-consuming processes in Cyber ​​Security. Fortunately, there are tools that we can use to automate the discovery process. Nessus is possibly the best known vulnerability analysis tool on the market. As a result, if there’s one scanner you should be familiar with, it’s Nessus.

In this video, we will discuss the Nessus Vulnerability Scanner. We’ll cover everything from the installation process and running your first vulnerability scan. I highly recommend that you follow him into his home lab to help him develop his skills with Nessus. Remember to only scan networks for which you have WRITTEN authorization to do so.

Practical vulnerability management:
Vulnerability management:
Security Risk Management:

0:00 ⏩ Introduction
1:25 ⏩ CIS Top 20 controls
2:28 ⏩ Introduction to Nessus
3:51 ⏩ Nessus installation
8:03 ⏩ Discovery exploration
8:31 ⏩ Basic Nessus scan
8:58 ⏩ Review the findings
10:49 ⏩ CVE findings
11:49 ⏩ Question of the day
12:03 ⏩ Final remarks

TenableNessus #VulnerabilityManagement #VulnerabilityScanner