|
|
|
|
LEADER |
00000cgm a22000007i 4500 |
001 |
OR_on1382339309 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
vz czazuu |
007 |
cr cnannnuuuuu |
008 |
230613s2023 xx 355 o vleng d |
040 |
|
|
|a ORMDA
|b eng
|e rda
|e pn
|c ORMDA
|d ORMDA
|d OCLCF
|d OCLCO
|
020 |
|
|
|a 9781805127321
|q (electronic video)
|
020 |
|
|
|a 1805127322
|q (electronic video)
|
029 |
1 |
|
|a AU@
|b 000074864612
|
035 |
|
|
|a (OCoLC)1382339309
|
037 |
|
|
|a 9781805127321
|b O'Reilly Media
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|2 23/eng/20230613
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Nessus scanner :
|b network scanning from beginner to advanced.
|
250 |
|
|
|a [First edition].
|
264 |
|
1 |
|a [Place of publication not identified] :
|b Packt Publishing,
|c 2023.
|
300 |
|
|
|a 1 online resource (1 video file (5 hr., 55 min.)) :
|b sound, color.
|
306 |
|
|
|a 055500
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
344 |
|
|
|a digital
|2 rdatr
|
347 |
|
|
|a video file
|2 rdaft
|
380 |
|
|
|a Instructional films
|2 lcgft
|
511 |
0 |
|
|a Avinash Yadav, presenter.
|
520 |
|
|
|a Nessus is a vulnerability scanner that helps security professionals identify and remediate potential vulnerabilities in their network, applications, and infrastructure with a wide range of features, including vulnerability scanning, compliance management, and reporting, to help organizations assess their security and mitigate risks. This course provides the knowledge and skills needed to use Nessus effectively. We will start with the basics, such as installing and setting up Nessus, and then move on to more advanced topics such as customizing scans and automating security testing. We will differentiate Nessus Essentials versus Nessus Professional and understand automated vulnerability scanning. You will learn to write custom professional reports and learn tips and tricks to handle Nessus well. We will explore the concept of second opinion scanning and differentiate unauthenticated and authenticated scans. We will explore network and web application scans and import results of Nmap in Nessus; we will create a VA Project Worksheet and explore vulnerability scanning with Metasploit. You will learn to manually analyze and rank vulnerabilities. By the end of this course, you will have learned everything needed to perform a complete vulnerability assessment independently using Nessus and identify, analyze, and rank security vulnerabilities. What You Will Learn Explore unauthenticated/authenticated scans and network/web app scans Automate vulnerability scanning and write custom professional reports Understand the concepts of second opinion scanning Learn and perform a vulnerability scanning using Metasploit Learn to import the results of Nmap in Nessus Analyze/rank vulnerabilities and create a VA Project Worksheet Audience This course is designed to deliver content for penetration testers looking to build deeper knowledge of Nessus, cybersecurity enthusiasts desiring to learn more about vulnerability assessments, and freelancers wishing to add an in-demand skill to their profile. The prerequisites for the course include a computer/device with Windows/OSX/Linux. No programming or hacking knowledge is required. The ability to Google using intermediate to advanced skills for obtaining information is desirable. About The Author Avinash Yadav: Avinash Yadav is a young information security expert with a special focus on cybersecurity management as well as double-blind penetration testing. He brings his experience to the table through his passion for teaching. He has authored a couple of online courses with well-curated concepts and practicals on penetration testing and information security that the students can pursue to build up skills that are needed to be able to work in the cybersecurity domain rather than just focusing on random sources of information. He looks forward to helping aspiring students on their journey to explore penetration testing, ethical hacking, and information security to become the person they would want to be, in an arguably short period of time!.
|
588 |
|
|
|a Online resource; title from title details screen (O'Reilly, viewed June 13, 2023).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
655 |
|
7 |
|a Instructional films
|2 fast
|
655 |
|
7 |
|a Internet videos
|2 fast
|
655 |
|
7 |
|a Nonfiction films
|2 fast
|
655 |
|
7 |
|a Instructional films.
|2 lcgft
|
655 |
|
7 |
|a Nonfiction films.
|2 lcgft
|
655 |
|
7 |
|a Internet videos.
|2 lcgft
|
655 |
|
7 |
|a Films de formation.
|2 rvmgf
|
655 |
|
7 |
|a Films autres que de fiction.
|2 rvmgf
|
655 |
|
7 |
|a Vidéos sur Internet.
|2 rvmgf
|
700 |
1 |
|
|a Yadav, Avinash,
|e presenter.
|
710 |
2 |
|
|a Packt Publishing,
|e publisher.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9781805127321/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|