×

Performing Network Vulnerability Scanning with Nexpose

Add to wishlistAdded to wishlistRemoved from wishlist 0
Add to compare+
Duration

2h 13m

level

Intermediate

Course Creator

Kevin Cardwell

Last Updated

07-May-18

Category:

In this course, you will learn how to deploy the Nexpose tool against a variety of different targets. You will create your own custom templates and tune them to create specific policies that match the target you are assessing.

Add your review

Organizations, both big and small, suffer from countless vulnerability issues. In this course, Performing Network Vulnerability Scanning with Nexpose, you will learn the foundational knowledge of using the vulnerability scanning tool, Nexpose, to assess the risk and the attack surface of a machine and/or network. First, you will learn how to prepare your toolkit and setup your sample targets to perfect your skills with your tool. Next, you will discover how to setup, configure, and customize your tool so that the deployment of it is in an effective manner and you can accurately assess the attack surface and risk of the target. Finally, you will explore how to tune and customize the Nexpose scanner to assess and evaluate web applications that are running on a web server. When you’re finished with this course, you will have the skills and knowledge of using the Nexpose Vulnerability Assessment tool to assess the weaknesses and evaluate the risk of the targets and networks to the organization’s overall risk needed to effectively identify potential attack vectors from an adversary, and take the required steps to mitigate the risk of these methods of attack.
Author Name: Kevin Cardwell
Author Description:
Kevin Cardwell provides consulting services for companies throughout the world and is an adviser to numerous government entities across the globe. He is an instructor, technical editor, and author for computer forensics and hacking courses. He is author of Building Virtual Pentesting Labs for Advanced Penetration Testing, first and second edition.

Table of Contents

  • Course Overview
    1min
  • Course Concepts
    4mins
  • Preparing the Toolkit
    33mins
  • Configuration and Setup of Nexpose
    32mins
  • Exploring Scan Policy Templates
    34mins
  • Web Application Scanning with Nexpose
    24mins
  • Conclusion
    3mins

User Reviews

0.0 out of 5
0
0
0
0
0
Write a review

There are no reviews yet.

Be the first to review “Performing Network Vulnerability Scanning with Nexpose”

Your email address will not be published. Required fields are marked *

Performing Network Vulnerability Scanning with Nexpose
Performing Network Vulnerability Scanning with Nexpose
Edcroma
Logo
Compare items
  • Total (0)
Compare
0
https://login.stikeselisabethmedan.ac.id/produtcs/
https://hakim.pa-bangil.go.id/
https://lowongan.mpi-indonesia.co.id/toto-slot/
https://cctv.sikkakab.go.id/
https://hakim.pa-bangil.go.id/products/
https://penerimaan.uinbanten.ac.id/
https://ssip.undar.ac.id/
https://putusan.pta-jakarta.go.id/
https://tekno88s.com/
https://majalah4dl.com/
https://nana16.shop/
https://thamuz12.shop/
https://dprd.sumbatimurkab.go.id/slot777/
https://dprd.sumbatimurkab.go.id/
https://cctv.sikkakab.go.id/slot-777/
https://hakim.pa-kuningan.go.id/
https://hakim.pa-kuningan.go.id/slot-gacor/
https://thamuz11.shop/
https://thamuz15.shop/
https://thamuz14.shop/
https://ppdb.smtimakassar.sch.id/
https://ppdb.smtimakassar.sch.id/slot-gacor/
slot777
slot dana
majalah4d
slot thailand
slot dana
rtp slot
toto slot
slot toto
toto4d
slot gacor
slot toto
toto slot
toto4d
slot gacor
tekno88
https://lowongan.mpi-indonesia.co.id/
https://thamuz13.shop/
https://www.alpha13.shop/
https://perpustakaan.smkpgri1mejayan.sch.id/
https://perpustakaan.smkpgri1mejayan.sch.id/toto-slot/
https://nana44.shop/
https://sadps.pa-negara.go.id/
https://sadps.pa-negara.go.id/slot-777/
https://peng.pn-baturaja.go.id/
https://portalkan.undar.ac.id/
https://portalkan.undar.ac.id/toto-slot/
https://penerimaan.ieu.ac.id/
https://sid.stikesbcm.ac.id/