Nessus Manager Training Course
The Nessus vulnerability scanner is a highly versatile platform designed for detecting and managing vulnerabilities. It offers capabilities that extend well beyond simple vulnerability detection, including baseline auditing, where your system configuration is compared against the best hardening standards.
In this instructor-led course, we will introduce you to the various components of the solution and explore its diverse functionalities. Each module within the application will be explained, along with practical use cases.
By the end of the course, participants will be able to perform both authenticated and unauthenticated vulnerability scans on almost all IP-based systems and analyze the scan results to eliminate false positives. They will also learn how to prioritize findings based on risk and recommend appropriate compensating controls. This course will empower participants to assess the security posture of their systems using Nessus and determine the best steps for remediation.
Audience:
- Infrastructure managers
- System administrators
- System auditors
- System compliance officers
- Vulnerability managers
- Cybersecurity managers
Format:
The course combines lectures, discussions, and hands-on practice to ensure a comprehensive learning experience.
This course is available as onsite live training in Slovakia or online live training.Course Outline
Overview of Nessus Interface and navigations
- Installing Nessus Server and License
- Checking plugins and updating plugins
- Scanning windows
- Using preloaded scan profiles
- Walk through of preinstalled configuration standards
- Navigating the interface
- Setting up notification
Scanning:
- Running simple scans
- Running scans from predefined templates
- Creating templates from preloaded plugins
- Asset discovery scans
Understanding Nessus output:
- Understanding Nessus output file
- Understanding risk rating and scoring
- Eliminating useless data and reducing output
- Validating findings
- Nessus reporting
Detailed review of Plugins:
- Data discovery plugins
- System specific plugins
- Compliance plugins
Requirements
Basic Knowledge of common protocols such as HTTP,HTTPS, SSH, SSL, Telnet SFTP etc
Basic knowledge of the OSI layers
Basic knowledge of IP addressing
Open Training Courses require 5+ participants.
Nessus Manager Training Course - Booking
Nessus Manager Training Course - Enquiry
Nessus Manager - Consultancy Enquiry
Consultancy Enquiry
Testimonials (2)
I generally was benefit from the whole training.
Tassos Papadopoulos
Course - Nessus Manager
The course build up the whole picture and helped me understand in depth how to deal with everyday tasks I perform with Tenable Census Manager.
Konstantinos Papadopoulos
Course - Nessus Manager
Upcoming Courses
Related Courses
Akraino
14 HoursThis instructor-led, live training in Slovakia (online or onsite) is aimed at programmers who wish to download, install, and set up Akraino Edge Stack blueprints to manage their edge systems.
By the end of this training, participants will be able to install, deploy, manage, and support end-to-end Akraino Edge Stack solutions to improve and organize their edge systems, services, and devices.
Certified Kubernetes Administrator (CKA) - exam preparation
21 HoursThe Certified Kubernetes Administrator (CKA) program was established by The Linux Foundation and the Cloud Native Computing Foundation (CNCF).
Kubernetes is currently a leading platform for container orchestration.
NobleProg has been offering Docker & Kubernetes training since 2015. With over 360 successfully completed training projects, we have become one of the most recognized training companies globally in the field of containerization.
Since 2019, we have also been assisting our clients in validating their performance in k8s environments by preparing them and encouraging them to pass the CKA and CKAD exams.
This instructor-led, live training (available online or onsite) is designed for System Administrators and Kubernetes users who wish to confirm their knowledge by passing the CKA exam.
Additionally, the training focuses on gaining practical experience in Kubernetes Administration. We recommend participating in it even if you do not plan to take the CKA exam.
Format of the Course
- Interactive lecture and discussion.
- Plenty of exercises and practice sessions.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
- To learn more about CKA certification, visit: https://training.linuxfoundation.org/certification/certified-kubernetes-administrator-cka
Certified Kubernetes Application Developer (CKAD) - exam preparation
21 HoursThe Certified Kubernetes Application Developer (CKAD) program has been developed by The Linux Foundation and the Cloud Native Computing Foundation (CNCF), which hosts Kubernetes.
This instructor-led, live training (available online or on-site) is designed for Developers who wish to validate their skills in designing, building, configuring, and exposing cloud-native applications for Kubernetes.
Additionally, the training focuses on gaining practical experience in Kubernetes application development, making it valuable even if you do not plan to take the CKAD exam.
NobleProg has been providing Docker & Kubernetes training since 2015. With over 360 successfully completed training projects, we have become one of the best-known training companies worldwide in the field of containerization. Since 2019, we have also been helping our clients confirm their proficiency in k8s environments by preparing them and encouraging them to pass the CKA and CKAD exams.
Format of the Course
- Interactive lecture and discussion.
- Extensive exercises and practice sessions.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
- To learn more about CKAD, visit: https://training.linuxfoundation.org/certification/certified-kubernetes-application-developer-ckad/
LEDE: Set Up a Linux Wireless Router
7 HoursThe LEDE Project (Linux Embedded Development Environment) is a Linux operating system derived from OpenWrt. It serves as a comprehensive alternative to the firmware provided by manufacturers for a broad range of wireless routers and non-network devices.
In this instructor-led, live training, participants will learn how to configure a wireless router using LEDE.
Audience
- Network administrators and technicians
Course Format
- The course combines theoretical lectures with discussions, practical exercises, and extensive hands-on practice
Network Security Administrator
35 HoursAudience:
System Administrators, Network Administrators, and anyone with an interest in defensive network security technologies.
ONAP for Network Orchestration and Automation
28 HoursIn this instructor-led, live training in Slovakia (online or onsite), participants will learn how to use ONAP to automate networking services.
By the end of this training, participants will be able to:
- Understand, install and configure the various components in the ONAP ecosystem.
- Carry out real-time, policy-driven orchestration and automation of physical and virtual network functions.
- Design, create, orchestrate, and monitor VNFs, SDNs and other network services.
- Efficiently manage the entire networking lifecycle using a software-driven approach.
- Develop, deploy, and scale a network using the latest open source technologies and practices.
OpenUEM Advanced: Automation, Security & Compliance
14 HoursOpenUEM is an open-source endpoint management platform that facilitates advanced automation, endpoint hardening, and compliance reporting to enhance the security and efficiency of enterprise operations.
This instructor-led, live training (available online or on-site) is designed for advanced-level IT and security professionals who want to utilize OpenUEM for automation, security enhancement, compliance management, and integration with enterprise monitoring tools.
By the end of this training, participants will be able to:
- Automate endpoint management tasks such as software deployment, updates, and reporting.
- Implement security hardening policies and ensure endpoint compliance.
- Integrate OpenUEM with enterprise security and monitoring tools for centralized visibility.
- Generate compliance reports and enforce regulatory or organizational standards.
Format of the Course
- Interactive lectures and discussions.
- Hands-on exercises and practice scenarios.
- Implementation in a lab environment with real endpoints.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
OpenUEM Fundamentals: Endpoint Management Essentials
14 HoursOpenUEM is an open-source unified endpoint management platform that enables organizations to deploy, configure, and maintain endpoint devices efficiently.
This instructor-led, live training (online or onsite) is designed for beginner-level IT professionals who want to acquire foundational skills in managing endpoints using OpenUEM. The course covers installation, configuration, and basic device management techniques.
By the end of this training, participants will be able to:
- Install and configure the OpenUEM server and agents across various endpoint platforms.
- Efficiently enroll, organize, and manage endpoints within the OpenUEM console.
- Deploy software, patches, and updates to managed devices.
- Monitor device health, generate reports, and perform basic troubleshooting tasks.
Format of the Course
- Interactive lectures and discussions.
- Hands-on exercises and practical scenarios.
- Implementation in a lab environment with real endpoints.
Course Customization Options
- For a customized training session for this course, please contact us to arrange.
OpenUEM Intermediate: Agent Deployment, Inventory & Policy Management
14 HoursOpenUEM is an open-source endpoint management platform that enables organizations to efficiently deploy agents, maintain accurate device inventories, and enforce endpoint policies.
This instructor-led, live training (online or onsite) is designed for intermediate-level IT professionals who want to develop practical skills in deploying agents, managing inventories, and implementing policies across endpoint devices using OpenUEM.
By the end of this training, participants will be able to:
- Efficiently deploy OpenUEM agents across various endpoint platforms.
- Maintain and manage precise asset inventories for all managed devices.
- Create, assign, and enforce policies to ensure compliance and security.
- Effectively distribute software, updates, and patches to endpoints.
Format of the Course
- Interactive lectures and discussions.
- Hands-on exercises and practice scenarios.
- Implementation in a lab environment with real endpoints.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
OpenStack and NFV (with OVN and OpenFlow)
21 HoursThe course offers a deep dive into OpenStack networking. It begins with an introduction to OpenStack and its architecture, followed by an explanation of key OpenStack projects such as the Identity service (Keystone), Image service (Glance), Compute service (Nova), and Block storage (Cinder). This foundational knowledge sets the stage for a detailed exploration of OpenStack's Networking project (Neutron). The course delves into virtual network infrastructure, leveraging the Open Virtual Network (OVN) project, Open vSwitch, and OpenFlow. The primary goal is to provide participants with a solid understanding of OpenStack's basic operations and architecture, as well as an in-depth look at the various networking technologies that underpin it, including detailed information on OVN, underlying flows, resources, and tools.
Customization Options
The training can be tailored to a 2-day format, focusing on core aspects relevant to the customer's needs. Alternatively, the course can be extended to cover additional topics such as administration, design, networking, and troubleshooting related to OpenStack deployments. It is also possible to explore other underlying SDN solutions like Linux Bridge or OvS.
Software-Defined Wide Area Network (SD-WAN) Management and Operation
7 HoursThis instructor-led, live training in Slovakia (online or onsite) is aimed at intermediate-level network professionals who wish to effectively manage and operate SD-WAN networks, including design, configuration, troubleshooting, and optimization.
By the end of this training, participants will be able to:
- Understand the fundamental concepts, benefits, and challenges associated with SD-WAN technologies.
- Design an SD-WAN architecture tailored to organizational needs and deploy SD-WAN solutions effectively.
- Implement and manage security features within an SD-WAN.
- Monitor, manage, and troubleshoot SD-WAN environments.
Varnish: Speeding Up Your Website with HTTP Reverse Proxy Caching
7 HoursVarnish is a reverse proxy designed for content-rich dynamic websites. Unlike Squid, which was initially developed as a client-side cache, or web servers like Apache and nginx, Varnish is specifically engineered as an HTTP accelerator. Varnish focuses solely on HTTP, unlike other proxy servers that support additional protocols such as FTP, SMTP, and others. Notable users of Varnish include Wikipedia, The New York Times, Facebook, and Twitter, among other prominent websites.
In this course, participants will gain a deep understanding of Varnish's features and caching mechanisms while gaining hands-on experience in setting up and configuring a Varnish proxy on Linux. The training begins with a refresher on essential networking principles, delves into setup and configuration topics, and gradually progresses to more complex implementations. By the end of the course, participants will be able to determine when and where it is appropriate to deploy Varnish and will have the practical skills needed to implement their own Varnish proxy solutions.
Audience
- Network technicians
- Network designers
- System administrators
Format of the course
- A combination of lectures, discussions, extensive hands-on practice and implementation, and occasional quizzes to assess progress
Network Troubleshooting with Wireshark
21 HoursNetwork packet analysis is a method used to observe, in real time, the raw data transmitted and received over a network interface. This technique is valuable for diagnosing issues with network configurations and network applications. Wireshark, a free open-source packet analyzer, is widely used for troubleshooting these types of network problems.
In this instructor-led, live training, participants will learn how to use Wireshark to assess the functionality and performance of a network, as well as various networked applications. They will gain an understanding of network troubleshooting principles and practice techniques for capturing and analyzing TCP/IP request and response traffic between different clients and servers.
By the end of this training, participants will be able to:
- Analyze network functionality and performance in various environments under different conditions
- Evaluate whether instances of different server applications are performing satisfactorily
- Identify the primary sources of network performance issues
- Diagnose and troubleshoot the most common causes of performance problems in TCP/IP communications
Audience
- Network engineers
- Network and computer technicians
Format of the Course
- Part lecture, part discussion, exercises, and extensive hands-on practice
Note
- To request a customized training for this course, please contact us to arrange.