Nessus Manager Training Course
The Nessus vulnerability scanner is a highly adaptable platform for identifying and managing vulnerabilities. It offers more than just vulnerability detection; it also supports baseline auditing by comparing your system configuration against the highest security standards.
In this instructor-led course, we will cover the various components of the solution and their functionalities. Each module within the application will be thoroughly explained along with its specific use cases.
By the end of the course, participants will be able to perform both authenticated and unauthenticated vulnerability scans on almost all IP-based systems and analyze scan results to filter out false positives. They will also learn how to prioritize findings based on risk levels and recommend appropriate compensating controls. This course will equip participants with the skills needed to assess their system's security posture using Nessus and determine effective remediation strategies.
Audience:
- Infrastructure managers
- System administrators
- System auditors
- Compliance officers for systems
- Vulnerability managers
- Cybersecurity managers
Format:
The course includes a mix of lectures, discussions, and hands-on practice.
This course is available as onsite live training in United Arab Emirates or online live training.Course Outline
Overview of Nessus Interface and navigations
- Installing Nessus Server and License
- Checking plugins and updating plugins
- Scanning windows
- Using preloaded scan profiles
- Walk through of preinstalled configuration standards
- Navigating the interface
- Setting up notification
Scanning:
- Running simple scans
- Running scans from predefined templates
- Creating templates from preloaded plugins
- Asset discovery scans
Understanding Nessus output:
- Understanding Nessus output file
- Understanding risk rating and scoring
- Eliminating useless data and reducing output
- Validating findings
- Nessus reporting
Detailed review of Plugins:
- Data discovery plugins
- System specific plugins
- Compliance plugins
Requirements
Basic Knowledge of common protocols such as HTTP,HTTPS, SSH, SSL, Telnet SFTP etc
Basic knowledge of the OSI layers
Basic knowledge of IP addressing
Need help picking the right course?
Nessus Manager Training Course - Enquiry
Testimonials (2)
I generally was benefit from the whole training.
Tassos Papadopoulos
Course - Nessus Manager
The course build up the whole picture and helped me understand in depth how to deal with everyday tasks I perform with Tenable Census Manager.
Konstantinos Papadopoulos
Course - Nessus Manager
Upcoming Courses
Related Courses
Akraino
14 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at programmers who wish to download, install, and set up Akraino Edge Stack blueprints to manage their edge systems.
By the end of this training, participants will be able to install, deploy, manage, and support end-to-end Akraino Edge Stack solutions to improve and organize their edge systems, services, and devices.
Certified Kubernetes Administrator (CKA) - exam preparation
21 HoursThe Certified Kubernetes Administrator (CKA) program was developed by The Linux Foundation and the Cloud Native Computing Foundation (CNCF).
Kubernetes is currently a leading platform for container orchestration.
NobleProg has been providing Docker & Kubernetes training since 2015. With over 360 successfully completed training projects, we have become one of the most recognized training providers globally in the field of containerization.
Since 2019, we have also assisted our clients in validating their proficiency in k8s environments by preparing them and motivating them to pass the CKA and CKAD exams.
This instructor-led live training (online or on-site) is designed for System Administrators and Kubernetes users who wish to validate their knowledge through the CKA exam.
Additionally, the course focuses on gaining practical experience in Kubernetes Administration. Therefore, we recommend participating even if you do not plan to take the CKA exam.
Course Format
- Interactive lectures and discussions.
- A multitude of exercises and practice sessions.
- Hands-on implementation in a live-lab environment.
Customization Options for the Course
- To request a customized training, please contact us to arrange it.
- To learn more about CKA certification, visit: https://training.linuxfoundation.org/certification/certified-kubernetes-administrator-cka
Certified Kubernetes Application Developer (CKAD) - exam preparation
21 HoursThe Certified Kubernetes Application Developer (CKAD) program has been created by The Linux Foundation and the Cloud Native Computing Foundation (CNCF), which oversees Kubernetes.
This instructor-led training session, whether online or in person, is designed for Developers looking to validate their abilities in designing, building, configuring, and deploying cloud-native applications on Kubernetes.
Moreover, the training emphasizes practical experience in developing Kubernetes applications. Therefore, we recommend participating even if you do not plan to take the CKAD exam.
NobleProg has been providing Docker & Kubernetes training since 2015. With over 360 successfully completed projects, we have become one of the leading training providers globally in containerization. Since 2019, we have also assisted our clients in demonstrating their proficiency in k8s environments by preparing them for and encouraging them to pass CKA and CKAD exams.
Course Format
- Interactive lectures and discussions.
- Numerous exercises and practice sessions.
- Hands-on implementation in a live-lab setting.
Customization Options for the Course
- To request customized training, please contact us to arrange it.
- For more information on CKAD, visit: https://training.linuxfoundation.org/certification/certified-kubernetes-application-developer-ckad/
CompTIA Network+ N10-008 exam prep with Exam (accredited training course with exam)
35 HoursIn this course, you will describe the major networking technologies and systems of modern networks and configure, manage, and troubleshoot modern networks.
- You will:
- Explain the OSI and TCP/IP Models.
- Explain properties of network traffic.
- Install and configure switched networks.
- Configure IP networks.
- Install and configure routed networks.
- Configure and monitor ports and protocols.
- Explain network application and storage issues.
- Monitor and troubleshoot networks.
- Explain network attacks and mitigations.
- Install and configure security devices.
- Explain authentication and access controls.
- Deploy and troubleshoot cabling solutions.
- Implement and troubleshoot wireless technologies.
- Compare and contrast WAN technologies.
- Use remote access methods.
- Identify site policies and best practices.
LEDE: Set Up a Linux Wireless Router
7 HoursThe LEDE Project (Linux Embedded Development Environment) is a Linux operating system derived from OpenWrt. It serves as a comprehensive alternative to the default firmware for various wireless routers and non-network devices.
During this instructor-led live training, participants will learn how to configure a wireless router using LEDE.
Audience
- Network administrators and technicians
Course Format
- The course includes lectures, discussions, exercises, and extensive hands-on practice.
Network Security Administrator
35 HoursAudience:
This course is designed for System Administrators, Network Administrators, and any individual with an interest in defensive network security technologies.
ONAP for Network Orchestration and Automation
28 HoursIn this instructor-led, live training in the UAE (online or onsite), participants will learn how to use ONAP to automate networking services.
By the end of this training, participants will be able to:
- Understand, install and configure the various components in the ONAP ecosystem.
- Carry out real-time, policy-driven orchestration and automation of physical and virtual network functions.
- Design, create, orchestrate, and monitor VNFs, SDNs and other network services.
- Efficiently manage the entire networking lifecycle using a software-driven approach.
- Develop, deploy, and scale a network using the latest open source technologies and practices.
OpenUEM Advanced: Automation, Security & Compliance
14 HoursOpenUEM is an open-source endpoint management platform that enables advanced automation, endpoint hardening, and compliance reporting to secure and streamline enterprise operations.
This instructor-led, live training (online or onsite) is aimed at advanced-level IT and security professionals who wish to leverage OpenUEM for automation, security hardening, compliance management, and integration with enterprise monitoring tools.
By the end of this training, participants will be able to:
- Automate endpoint management tasks including software deployment, updates, and reporting.
- Apply security hardening policies and ensure endpoint compliance.
- Integrate OpenUEM with enterprise security and monitoring tools for centralized visibility.
- Generate compliance reports and enforce regulatory or organizational standards.
Format of the Course
- Interactive lecture and discussion.
- Hands-on exercises and practice scenarios.
- Implementation in a lab environment with real endpoints.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
OpenUEM Fundamentals: Endpoint Management Essentials
14 HoursOpenUEM is an open-source unified endpoint management platform that enables organizations to deploy, configure, and maintain endpoint devices efficiently.
This instructor-led, live training (online or onsite) is aimed at beginner-level IT professionals who wish to gain foundational skills in managing endpoints using OpenUEM, including installation, configuration, and basic device management.
By the end of this training, participants will be able to:
- Install and configure OpenUEM server and agents across multiple endpoint platforms.
- Enroll, organize, and manage endpoints efficiently within the OpenUEM console.
- Deploy software, patches, and updates to managed devices.
- Monitor device health, generate reports, and perform basic troubleshooting tasks.
Format of the Course
- Interactive lecture and discussion.
- Hands-on exercises and practice scenarios.
- Implementation in a lab environment with real endpoints.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
OpenUEM Intermediate: Agent Deployment, Inventory & Policy Management
14 HoursOpenUEM is an open-source endpoint management platform that allows organizations to efficiently deploy agents, maintain accurate device inventories, and enforce endpoint policies.
This instructor-led, live training (online or onsite) is aimed at intermediate-level IT professionals who wish to gain practical skills in deploying agents, managing inventories, and implementing policies across endpoint devices using OpenUEM.
By the end of this training, participants will be able to:
- Deploy OpenUEM agents efficiently across multiple endpoint platforms.
- Maintain and manage accurate asset inventories for all managed devices.
- Create, assign, and enforce policies to ensure compliance and security.
- Distribute software, updates, and patches to endpoints effectively.
Format of the Course
- Interactive lecture and discussion.
- Hands-on exercises and practice scenarios.
- Implementation in a lab environment with real endpoints.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
OpenStack and NFV (with OVN and OpenFlow)
21 HoursThis course offers an in-depth exploration of OpenStack networking. It begins with an introduction to OpenStack and its architecture, followed by explanations of key OpenStack projects such as Identity service (Keystone), Image service (Glance), Compute service (Nova), and Block storage (Cinder). This provides a comprehensive overview of the network environment within OpenStack, with particular emphasis on the Networking project (Neutron). The course also delves into virtual network infrastructure using the Open Virtual Network project, Open vSwitch, and OpenFlow. The aim is to provide participants with a solid understanding of the fundamental operations and architecture of OpenStack, as well as familiarity with various networking technologies that underpin it, including detailed insights into OVN and its associated flows, resources, and tools.
Customization Options
The training can be tailored to a two-day format, focusing on core elements pertinent to the customer’s needs. Additionally, the course can be expanded to cover administrative, design, networking, or troubleshooting aspects related to OpenStack deployments. Other underlying SDN solutions such as Linux Bridge or OvS can also be discussed.
Software-Defined Wide Area Network (SD-WAN) Management and Operation
7 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at intermediate-level network professionals who wish to effectively manage and operate SD-WAN networks, including design, configuration, troubleshooting, and optimization.
By the end of this training, participants will be able to:
- Understand the fundamental concepts, benefits, and challenges associated with SD-WAN technologies.
- Design an SD-WAN architecture tailored to organizational needs and deploy SD-WAN solutions effectively.
- Implement and manage security features within an SD-WAN.
- Monitor, manage, and troubleshoot SD-WAN environments.
Varnish: Speeding Up Your Website with HTTP Reverse Proxy Caching
7 HoursVarnish serves as a reverse proxy specifically designed for content-heavy dynamic web sites. Unlike Squid, which was initially developed as a client-side cache, or web servers such as Apache and nginx, Varnish focuses on accelerating HTTP traffic. It is dedicated solely to HTTP, in contrast to other proxy servers that support additional protocols like FTP and SMTP. Notable users of Varnish include Wikipedia, The New York Times, Facebook, and Twitter.
This course will cover the features and caching techniques of Varnish while providing hands-on experience with setting up and configuring a Varnish proxy on Linux. It begins with a review of essential networking concepts before delving into setup and configuration specifics, gradually progressing to more advanced implementations. By the conclusion of the training, participants will be equipped with the knowledge to determine appropriate scenarios for deploying Varnish and will have gained practical experience in setting up their own Varnish proxy solutions.
Target Audience
- Network technicians
- Network designers
- System administrators
Course Format
- A blend of lectures, discussions, extensive hands-on practice and implementation, with occasional quizzes to assess progress.
Network Troubleshooting with Wireshark
21 HoursNetwork packet analysis is a method used to monitor raw data transmitted over a network interface in real time. This technique is invaluable for diagnosing issues related to network configurations and applications. Wireshark, a free open-source tool, is widely utilized for this purpose.
In this instructor-led training session, participants will learn how to use Wireshark effectively to diagnose the functionality of networks and the performance of various networked applications. They will also gain an understanding of fundamental principles in network troubleshooting and practice methods for capturing and analyzing TCP/IP traffic between clients and servers.
Upon completion of this training, participants will be able to:
- Evaluate network functionality and performance across different environments and conditions
- Determine if various server applications are operating satisfactorily
- Pinpoint the main sources of network performance issues
- Identify and resolve common causes of performance problems in TCP/IP communications
Audience
- Network engineers
- Network and computer technicians
Format of the Course
- The course includes lectures, discussions, exercises, and extensive hands-on practice.
Note
- To request a customized training for this course, please contact us to arrange.