OpenVAS Concepts and Scanning
Offered By: Pluralsight
Course Description
Overview
This course will teach you how to use the OpenVAS suite to perform complete and effective vulnerability scans.
In order to know whether or not your digital assets are secure, you need to assess the target network and its compute resources for known vulnerabilities. In this course, Network Vulnerability Scanning with OpenVAS, you’ll learn to test your infrastructure for dangerous vulnerabilities. First, you’ll install and configure OpenVAS on Linux using the official Docker container images. Next, you'll come to understand the roles played by each of the public vulnerability databases on which vulnerability scanning relies. Finally, you'll launch a range of scans against live targets, and make sense of the reports that your scans will generate. When you’re finished with this course, you’ll have the skills and knowledge of OpenVAS needed to better secure servers and IT resources.
In order to know whether or not your digital assets are secure, you need to assess the target network and its compute resources for known vulnerabilities. In this course, Network Vulnerability Scanning with OpenVAS, you’ll learn to test your infrastructure for dangerous vulnerabilities. First, you’ll install and configure OpenVAS on Linux using the official Docker container images. Next, you'll come to understand the roles played by each of the public vulnerability databases on which vulnerability scanning relies. Finally, you'll launch a range of scans against live targets, and make sense of the reports that your scans will generate. When you’re finished with this course, you’ll have the skills and knowledge of OpenVAS needed to better secure servers and IT resources.
Syllabus
- Course Overview 1min
- Getting Started with OpenVAS 14mins
- OpenVAS Administration 11mins
- Working with NVTs and CVEs 9mins
- Scanning and Interpreting Results with OpenVAS 12mins
Taught by
David Clinton
Related Courses
An Introduction to Computer NetworksStanford University via Independent Computer Networks
University of Washington via Coursera Computer Networking
Georgia Institute of Technology via Udacity Cybersecurity and Its Ten Domains
University System of Georgia via Coursera Model Building and Validation
AT&T via Udacity