What Does MVP Stand For? It’s Not What You Think.
October 7, 2024
Article
Instructor: Packt - Course Instructors
Included with
Recommended experience
Beginner level
IT pros, admins, and analysts aiming to skill up in vulnerability scanning and network security. Basic networking and security knowledge are helpful.
Recommended experience
Beginner level
IT pros, admins, and analysts aiming to skill up in vulnerability scanning and network security. Basic networking and security knowledge are helpful.
Distinguish between unauthenticated/authenticated scans and network/web application scans.
Automate vulnerability scanning processes and create custom professional reports.
Integrate Nmap results into Nessus.
Explain the concepts of second opinion scanning.
Add to your LinkedIn profile
September 2024
3 assignments
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
Dive into the world of network security with this guide to using Nessus, one of the most trusted vulnerability scanners in the industry. Starting with the basics, you’ll learn how to install and configure Nessus on various platforms, setting up a robust environment for hands-on practice. The course gradually introduces essential vulnerability assessment concepts, covering passive and active information gathering, manual vulnerability analysis, and the theoretical foundations for a robust security framework.
As you progress, you’ll explore each feature of Nessus in detail, from managing scan folders to running practical, real-world scans on live systems. Detailed lessons will walk you through host discovery, operating system identification, and how to analyze and interpret the results of your scans to prioritize remediation efforts. Advanced users will benefit from in-depth tutorials on using Nessus for compliance audits, web application scanning, and performing authenticated scans. The course also covers integration with tools like Metasploit and alternatives like Nmap and Vega, broadening your scanning toolkit. Finally, you'll explore real-life applications of Nessus, including creating reusable scan policies, using compliance templates, and customizing the Nessus scanner with advanced configuration files like nessusd.rules. By the end of this course, you'll not only master Nessus but also learn how to tailor its capabilities to your network's unique needs, making you a more effective and confident security professional. This course is ideal for IT professionals, network administrators, and security analysts looking to enhance their vulnerability scanning and network security skills. A basic understanding of networking and security concepts is recommended but not required.
In this module, we will introduce the significance of network security and explain why using a vulnerability scanner like Nessus is crucial. You'll learn about the growing threats in the digital landscape and how security breaches can lead to severe repercussions.
1 video1 reading
In this module, we will guide you through the installation process of Nessus on Windows, Linux, and macOS. You’ll also learn about the differences between the free and professional versions of Nessus, and how to set up your Nessus account to begin vulnerability scanning.
2 videos
In this module, we will delve into the foundational concepts of vulnerability analysis, covering the theoretical aspects as well as practical techniques for gathering information about target networks. You'll also explore manual methods to assess vulnerabilities before relying on automated tools.
4 videos1 assignment
In this module, we will provide an in-depth walkthrough of Nessus, focusing on its various tabs and features. You'll learn how to organize scans, set up basic and advanced scanning techniques, and use different Nessus resources to optimize your vulnerability assessments.
7 videos
In this module, we will apply Nessus to real-world scenarios, showing how to create reusable scans, perform compliance audits, and secure web applications. You'll also learn about authenticated scans and explore alternatives to Nessus for specific security assessments.
8 videos
In this module, we will focus on creating a fully customized vulnerability assessment report. You’ll learn how to plan and document your scanning activities, organize results, and generate detailed reports that meet the specific needs of your security projects.
1 video2 assignments
Packt helps tech professionals put software to work by distilling and sharing the working knowledge of their peers. Packt is an established global technical learning content provider, founded in Birmingham, UK, with over twenty years of experience delivering premium, rich content from groundbreaking authors on a wide range of emerging and popular technologies.
Coursera Project Network
Course
Course
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Earn a degree from world-class universities - 100% online
Upskill your employees to excel in the digital economy
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
If you complete the course successfully, your electronic Course Certificate will be added to your Accomplishments page - from there, you can print your Course Certificate or add it to your LinkedIn profile.
This course is one of a few offered on Coursera that are currently available only to learners who have paid or received financial aid, when available.
You will be eligible for a full refund until two weeks after your payment date, or (for courses that have just launched) until two weeks after the first session of the course begins, whichever is later. You cannot receive a refund once you’ve earned a Course Certificate, even if you complete the course within the two-week refund period. See our full refund policy.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work.
These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.
These cookies enable the website to provide enhanced functionality and personalization. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly.