computer network vulnerability assessment using nessus

Advertisment


 computer network vulnerability assessment using nessus
Have you ever thought how a penetration tester, security engineer and Infosec consultant find vulnerabilities on a system, network and application? You must be curious about it, but you should not because you can also do this. By the end of the topic, you will: Understand the vulnerability assessment, its types and its process Be able to install the metasploitable as a vulnerable machine on your virtual lab Understand the Nessus environment, its architecture, installation and configuration process Learn to create basic policy for your scan, and advance policies as well. Create your own scan based on the assessment need and objectives Create reports and you will be able to find the exploits of the found vulnerabilities