Advertisment
Have you ever thought how a penetration tester, security engineer and Infosec consultant find vulnerabilities on a system, network and application? You must be curious about it, but you should not because you can also do this.
By the end of the topic, you will:
Understand the vulnerability assessment, its types and its process
Be able to install the metasploitable as a vulnerable machine on your virtual lab
Understand the Nessus environment, its architecture, installation and configuration process
Learn to create basic policy for your scan, and advance policies as well.
Create your own scan based on the assessment need and objectives
Create reports and you will be able to find the exploits of the found vulnerabilities