Nessus Manager Training Course
The Nessus vulnerability scanner serves as a highly adaptable platform for identifying and managing security weaknesses. Beyond standard vulnerability detection, it offers extensive capabilities, including baseline auditing. This process involves comparing your system configurations against industry-leading hardening standards to ensure robust security.
In this instructor-led course, we will introduce the core components of the solution and explore its various functionalities. Each module within the application will be thoroughly explained, with practical use cases demonstrated.
Upon completing the course, participants will be equipped to perform both authenticated and unauthenticated vulnerability scans on nearly all IP-based systems. They will learn to analyze scan results effectively to filter out false positives, prioritize findings based on risk, and recommend appropriate compensating controls. This training will empower participants to assess their systems' security posture using Nessus and determine the most effective remediation strategies.
Audience:
- Infrastructure managers
- System administrators
- System auditors
- System compliance officers
- Vulnerability managers
- Cybersecurity managers
Format:
A blend of lecture, discussion, and hands-on practice
This course is available as onsite live training in Norway or online live training.Course Outline
Overview of Nessus Interface and Navigation
- Installing the Nessus Server and managing licenses
- Verifying and updating plugins
- Conducting Windows scans
- Utilizing pre-loaded scan profiles
- Exploring pre-installed configuration standards
- Navigating the user interface
- Configuring notifications
Scanning Techniques:
- Executing basic scans
- Running scans from predefined templates
- Creating custom templates using pre-loaded plugins
- Performing asset discovery scans
Interpreting Nessus Output:
- Analyzing the Nessus output file
- Understanding risk ratings and scoring methodologies
- Filtering out irrelevant data to streamline results
- Validating identified findings
- Generating Nessus reports
Comprehensive Review of Plugins:
- Data discovery plugins
- System-specific plugins
- Compliance plugins
Requirements
Foundational knowledge of common protocols such as HTTP, HTTPS, SSH, SSL, Telnet, and SFTP
Basic understanding of the OSI model layers
Fundamental knowledge of IP addressing
Open Training Courses require 5+ participants.
Nessus Manager Training Course - Booking
Nessus Manager Training Course - Enquiry
Nessus Manager - Consultancy Enquiry
Testimonials (2)
I generally was benefit from the whole training.
Tassos Papadopoulos
Course - Nessus Manager
The course build up the whole picture and helped me understand in depth how to deal with everyday tasks I perform with Tenable Census Manager.
Konstantinos Papadopoulos
Course - Nessus Manager
Upcoming Courses
Related Courses
Akraino
14 HoursThis instructor-led, live training in Norway (online or onsite) targets programmers seeking to download, install, and configure Akraino Edge Stack blueprints to manage their edge systems.
Upon completion of this training, participants will be equipped to install, deploy, manage, and support end-to-end Akraino Edge Stack solutions, thereby improving and organizing their edge systems, services, and devices.
Certified Kubernetes Administrator (CKA) - exam preparation
21 HoursThe Certified Kubernetes Administrator (CKA) credential was established by The Linux Foundation and the Cloud Native Computing Foundation (CNCF).
Kubernetes has emerged as the leading platform for container orchestration.
NobleProg has provided Docker and Kubernetes training since 2015. Having successfully completed over 360 training projects, we have established ourselves as one of the world's most renowned training providers in the field of containerization.
Since 2019, we have been assisting our customers in validating their expertise in Kubernetes environments by preparing them to take and pass the CKA and CKAD exams.
This instructor-led, live training (available online or onsite) is designed for System Administrators and Kubernetes users who wish to validate their knowledge by passing the CKA exam.
Additionally, the training emphasizes gaining practical experience in Kubernetes Administration; therefore, we recommend participating even if you do not plan to take the CKA exam.
Course Format
- Interactive lectures and discussions.
- Extensive exercises and practice sessions.
- Hands-on implementation in a live lab environment.
Course Customization Options
- To request customized training for this course, please contact us to arrange it.
- For more information about CKA certification, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-administrator-cka
Certified Kubernetes Application Developer (CKAD) - exam preparation
21 HoursThe Certified Kubernetes Application Developer (CKAD) program was created by The Linux Foundation and the Cloud Native Computing Foundation (CNCF), the organization behind Kubernetes.
This instructor-led live training (available online or on-site) targets developers who want to validate their expertise in designing, building, configuring, and exposing cloud-native applications for Kubernetes.
Additionally, the training emphasizes practical experience in Kubernetes application development; therefore, we recommend participating even if you do not plan to take the CKAD exam.
NobleProg has been providing Docker & Kubernetes training since 2015. With over 360 successfully completed training projects, we have become one of the most recognized training companies globally in the field of containerization. Since 2019, we have also assisted customers in demonstrating their performance in k8s environments by preparing them to pass the CKA and CKAD exams.
Course Format
- Interactive lectures and discussions.
- Extensive exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request customized training for this course, please contact us to arrange.
- For more information about CKAD, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-application-developer-ckad/
LEDE: Set Up a Linux Wireless Router
7 HoursThe LEDE Project (Linux Embedded Development Environment) is a Linux operating system derived from OpenWrt. It serves as a comprehensive replacement for the vendor-provided firmware on a wide variety of wireless routers and non-network devices.
In this instructor-led live training, participants will learn how to configure a wireless router based on LEDE.
Audience
- Network administrators and technicians
Format of the course
- A mix of lectures, discussions, exercises, and extensive hands-on practice
Network Monitoring Without Vendor Lock-in: LibreNMS and Zabbix
28 HoursThis instructor-led, live training in Norway (online or onsite) targets network and system administrators who aim to deploy enterprise-grade network monitoring using open-source tools without vendor constraints.
By the end of this training, participants will be able to deploy LibreNMS and Zabbix, monitor network devices, create dashboards and alerts, implement distributed monitoring, and integrate with external systems.
Network Security Administrator
35 HoursAudience:
System Administrators and Network Administrators as well as anyone who is interested in defensive network security technologies.
ONAP for Network Orchestration and Automation
28 HoursIn this instructor-led, live training in Norway (online or onsite), participants will learn how to use ONAP to automate networking services.
By the end of this training, participants will be able to:
- Understand, install and configure the various components in the ONAP ecosystem.
- Carry out real-time, policy-driven orchestration and automation of physical and virtual network functions.
- Design, create, orchestrate, and monitor VNFs, SDNs and other network services.
- Efficiently manage the entire networking lifecycle using a software-driven approach.
- Develop, deploy, and scale a network using the latest open source technologies and practices.
OpenUEM Advanced: Automation, Security & Compliance
14 HoursOpenUEM is an open-source endpoint management platform that enables advanced automation, endpoint hardening, and compliance reporting to secure and streamline enterprise operations.
This instructor-led, live training (online or onsite) is aimed at advanced-level IT and security professionals who wish to leverage OpenUEM for automation, security hardening, compliance management, and integration with enterprise monitoring tools.
By the end of this training, participants will be able to:
- Automate endpoint management tasks including software deployment, updates, and reporting.
- Apply security hardening policies and ensure endpoint compliance.
- Integrate OpenUEM with enterprise security and monitoring tools for centralized visibility.
- Generate compliance reports and enforce regulatory or organizational standards.
Format of the Course
- Interactive lecture and discussion.
- Hands-on exercises and practice scenarios.
- Implementation in a lab environment with real endpoints.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
OpenUEM Fundamentals: Endpoint Management Essentials
14 HoursOpenUEM is an open-source unified endpoint management platform that empowers organizations to deploy, configure, and maintain endpoint devices with efficiency.
This instructor-led live training (available online or onsite) is designed for beginner-level IT professionals seeking to build foundational skills in endpoint management via OpenUEM, covering installation, configuration, and fundamental device administration.
Upon completion of this training, participants will be capable of:
- Installing and configuring the OpenUEM server and agents across various endpoint platforms.
- Efficiently enrolling, organizing, and managing endpoints within the OpenUEM console.
- Deploying software, patches, and updates to managed devices.
- Monitoring device health, generating reports, and executing basic troubleshooting tasks.
Course Format
- Interactive lectures and discussions.
- Hands-on exercises and practical scenarios.
- Lab implementation utilizing real endpoints.
Course Customization Options
- To request customized training for this course, please contact us to make arrangements.
OpenUEM Intermediate: Agent Deployment, Inventory & Policy Management
14 HoursOpenUEM serves as an open-source endpoint management platform, empowering organizations to efficiently deploy agents, maintain precise device inventories, and enforce endpoint policies.
This instructor-led live training, available either online or onsite, is designed for intermediate-level IT professionals seeking to develop practical skills in deploying agents, managing inventories, and implementing policies across endpoint devices using OpenUEM.
Upon completion of this training, participants will be capable of:
- Efficiently deploying OpenUEM agents across various endpoint platforms.
- Maintaining and managing accurate asset inventories for all managed devices.
- Creating, assigning, and enforcing policies to ensure compliance and security.
- Effectively distributing software, updates, and patches to endpoints.
Course Format
- Interactive lectures and discussions.
- Hands-on exercises and practice scenarios.
- Implementation within a lab environment using real endpoints.
Customization Options
- To request customized training for this course, please contact us to make arrangements.
OpenStack and NFV (with OVN and OpenFlow)
21 HoursThis course offers an in-depth training on OpenStack networking. It begins by introducing OpenStack and its architecture, then clarifies core OpenStack projects—Identity service (Keystone), Image service (Glance), Compute service (Nova), and Block storage (Cinder)—to describe the surrounding ecosystem of networks within OpenStack. The main focus is placed on the Networking project (Neutron). The course describes virtual network infrastructure based on the Open Virtual Network project, Open vSwitch, and OpenFlow. The goal is to help participants understand the basic operations and architecture of OpenStack, while familiarizing them with the various networking technologies behind OpenStack, extending information about OVN, underlying flows, resources, and tools.
Customization options
The training can be contracted for 2 days, focusing on core aspects relevant to the customer. The training can also be extended regarding administrative, design, networking, and/or troubleshooting topics concerning OpenStack deployments. It is possible to describe other underlying SDN solutions like Linux Bridge or OvS.
Software-Defined Wide Area Network (SD-WAN) Management and Operation
7 HoursThis instructor-led, live training in Norway (online or onsite) is designed for intermediate-level network professionals seeking to effectively manage and operate SD-WAN networks. The program covers design, configuration, troubleshooting, and optimization.
By the end of this training, participants will be able to:
- Grasp the fundamental concepts, advantages, and challenges associated with SD-WAN technologies.
- Design an SD-WAN architecture customized to organizational needs and deploy SD-WAN solutions efficiently.
- Implement and manage security features within an SD-WAN environment.
- Monitor, manage, and troubleshoot SD-WAN infrastructures.
Varnish: Speeding Up Your Website with HTTP Reverse Proxy Caching
7 HoursVarnish operates as a reverse proxy tailored for dynamic, content-intensive web sites. Distinct from Squid, which originated as a client-side cache, or web servers like Apache and nginx, Varnish was engineered specifically as an HTTP accelerator. It focuses solely on HTTP, unlike other proxy servers that handle FTP, SMTP, and additional network protocols. High-profile platforms such as Wikipedia, The New York Times, Facebook, and Twitter utilize Varnish among others.
Through this course, participants will explore Varnish's features and caching methodologies, gaining practical experience in setting up and configuring a Varnish proxy on a Linux environment. The curriculum begins with a review of fundamental networking principles before advancing into detailed setup and configuration, progressing toward more complex deployments. Upon completion, attendees will grasp the optimal scenarios for deploying Varnish and possess the hands-on skills required to implement their own Varnish proxy solutions.
Audience
- Network technicians
- Network designers
- System administrators
Format of the course
- A blend of lectures and discussions, emphasizing extensive hands-on practice and implementation, with periodic quizzes to assess progress
Network Troubleshooting with Wireshark
21 HoursNetwork packet analysis is a technique used to view, in real time, the raw data sent and received over a network interface. This is useful for troubleshooting network configuration and network application problems. Wireshark is a free open source packet analyzer used for troubleshooting such network issues.
In this instructor-led, live training, participants will learn how to use Wireshark to troubleshoot the functionality of a network as well as the performance of different networked applications. Participants will learn network troubleshooting principles and practice techniques for capturing and analyzing TCP/IP request and response traffic between different clients and the servers.
By the end of this training, participants will be able to:
- Analyze network functionality and performance in various environments under different conditions
- Determine whether instances of different server applications are performing acceptably
- Identify the primary sources of network performance problems
- Identify and troubleshoot the most common causes of performance problems in TCP/IP communications
Audience
- Network engineers
- Network and computer technicians
Format of the Course
- Part lecture, part discussion, exercises and heavy hands-on practice
Note
- To request a customized training for this course, please contact us to arrange.