How do you detect vulnerabilities that exist in a network or on a system?
Make sure to subscribe so you don’t miss new content!
Join my newsletter for a FREE copy of my eBook…Guide to Cyber Security Careers! https://www.jongood.com/newsletter/
The ability to identify vulnerabilities and to track them throughout their life cycle is crucial to maintaining a secure network. According to the CIS 20 Controls, Continuous Vulnerability Management is the third most important and basic control that you should have in your network. Unfortunately, vulnerability detection and vulnerability management can be two very time-consuming processes in Cyber Security. Luckily, there are tools that we can use to automate the discovery process. Nessus is arguably the most well-known vulnerability scanning tool in the market. As a result, if there is one scanner you should be familiar with then it’s Nessus.
In this video, we will walk through the Nessus Vulnerability Scanner. We will cover everything from the installation process and running your first vulnerability scan. I highly encourage you to follow along in your home lab to help build your skills with Nessus. Remember you should only scan networks that you have WRITTEN authorization to do so.
#TenableNessus #VulnerabilityManagement #VulnerabilityScanner
DISCLAIMER: I am an ambassador or affiliate for many of the brands referenced on the channel. As an Amazon Associate, I earn a commission from qualifying purchases.