->


Basic Security Testing with OpenVAS and Penetration Testing


 


Basic Security Testing with OpenVAS and Penetration Testing
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100 Hz, 2ch | Size: 690 MB
Genre: eLearning Video | Duration: 8 lectures (1 hour, 7 mins) | Language: English

Learn Installation of OpenVAS/GVM Basic - Security Testing and Penetration Hacking


What you'll learn

Installation and management of OpenVAS/GVM
Complete host scan, server scan and database scan with OpenVAS/GVM.
Behind the scene of Vulnerability scanning with OpenVAS.

Requirements

Basics of TCP/IP model
Knowledge of Windows fundmentals

Description

OpenVAS/GVM is a fully-featured vulnerability scanner, but it’s also one component of the larger “Greenbone Security Manager” (GSM).

OpenVAS dates back to 2009 and the project is maintained by a commercial/open-source company. With its focus on the enterprise market and its long history, any risks of enterprises adopting a technology that might become abandoned are greatly reduced.

Here are some notable positives of OpenVAS/GVM:

Has a long history (since 2009) with daily updates and over 50,000 vulnerability tests

Is backed by an enterprise software-security company

Can perform various types of authenticated/unauthenticated tests

Supports a variety of high- and low-level Internet and industrial protocols

Has an internal programming language that can be used for implementing custom vulnerability tests


Vulnerability scanning is one of the foundations of standard enterprise security. An enterprise with a good security posture will have: a firewall, some type of asset-mapping, a vulnerability scanner and possibly even a security team that does some type of pentesting. Keep in mind that the list above is not exhaustive, but the rudimentary outline of an enterprise with a few good security measures in place.

Vulnerability scanners, in particular, are critical for ensuring that any threats that may have made it past the firewall are picked up before they can infect and destroy entire networks.

The enterprise/proprietary vulnerability scanner market is filled with competitors (such as QualysGuard or Nessus), and while some companies prefer running proprietary enterprise scanners, there are also many companies that prefer using collective intelligence and open source scanners.

One such product is OpenVAS (now renamed Greenbone Vulnerability Management or GVM). In this post we’ll refer to OpenVAS/GVM interchangeably, as the old name is still used to identify the software.

Who this course is for:

Security Analyst who want scan their complete Infrastructure including Network, database and Web Applications
Cybersecurity or Infosec engineers who want to learn Web Application Scanning in details with Nessus Scanner


 


Homepage: https://www.udemy.com/course/basic-security-testing-with-openvas-and-penetration-testing/

Basic Security Testing with OpenVAS and Penetration Testing


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Broknote   |  

Information
Members of Guests cannot leave comments.




rss