Resultados 1 al 1 de 1

Tema: OpenVas Basic to Advanced For Ethical Hacking & Pentesting

Vista híbrida

Mensaje anterior Mensaje anterior   Próximo mensaje Próximo mensaje
  1. #1
    Fecha de ingreso
    agosto 2015
    Mensajes
    7.353
    Agradecido: 303

    Predeterminado OpenVas Basic to Advanced For Ethical Hacking & Pentesting

    7095a62b5dbcccd5edeb0ca76256a8bf - OpenVas  Basic to Advanced For Ethical Hacking & Pentesting
    Genre: eLearning | MP4 | Video: h264, 1280x720 | Audio: AAC, 48.0 KHz
    Language: English | Size: 2.55 GB | Duration: 4h 58m
    Learn OpenVas GVM from scratch, in Kali Linux, Ethical Hacking & Pentesting, setup advanced scans, alerts, reports.

    What you'll learn
    Setup OpenVas (GVM) in Kali Linux
    Setup Greenbone Operating Systems (GOS)
    Vulnerability Management Process
    Generate reports and apply notes and overrides
    Advanced user management
    Create and assign Tickets to users
    Setup Alerts via email and SMB
    Business Process Map
    Work with compliance policies
    Perform compliance policies
    Configure advanced filters
    Understand SCAP concepts
    Social Engeering Red Flags
    CIS controls v8 to secure systems

    Description
    With the growing number of cases of cyber attacks, system invasions, data theft, malware attacks such as Ransomeware among others, vulnerability management to prevent invasions and ensure information security has become an indispensable task for IT professionals and organizations in general. In addition to implementing security mechanisms to protect oneself, it is necessary to know the vulnerabilities and deal with them. The issue of vulnerability management is so serious that even in the phase of a penetration test or cyber attack, the phase that precedes the invasion, is the discovery of vulnerabilities, i.e. when an attacker wants to attack a system, he will need to know the vulnerabilities and after knowing them, exploit them. Therefore, in this course you will have the opportunity to learn how to find the vulnerabilities in systems, find solutions, and elaborate a mitigation plan for them and implement countermeasures with the best practices guide according to the Center for Internet Security (CIS Control Set), an entity that works to support organizations to implement best practices for asset management and data backup. It is important to know how vulnerability scanners work for better positioning when it comes to decision making after analysis. After completing this course, you will be able to implement and manage OpenVas as well as assign tickets to the different people responsible for each department where vulnerabilities are detected as well as to IT professionals.

    Who this course is for:
    Network Administrators
    Information Technology professionals and students
    Curious and everyone who cares about information security
    Information security enthusiasts who want to learn how to manage vulnerabilities

    Screenshots

    63d32dc5800abd04638f9f9195a45947 - OpenVas  Basic to Advanced For Ethical Hacking & Pentesting

    Download link:
    Contenido oculto. Ha de estar registrado, y pulsar el botón "Gracias" para visualizar sus enlaces de descarga.
    Si trás registrarse todavía no visualiza el botón de "gracias", pulse la tecla F5, para refrescar la página.

  2. El siguiente Usuario agradeció a nguoivohinh este mensaje:

    cazziamazzi (27 octubre 2022)

Etiquetas para este tema

Permisos de publicación