|+31 (0)85 060 99 94
Click here to add this event to your google calendar
The vulnerability management process is very important for detecting and remediating vulnerabilities in any organization. In this vulnerability management training, we will focus on how to create this process and follow it in an effective way.
We will focus on using Tenable Nessus vulnerability detection. The Tenable tools are very effective in dealing with vulnerabilities and having an automated way of reducing risks.
In this vulnerability management training, we will talk about the process but also introduce the components of Tenable scanners and their different functionalities.
At the end of the training, participants will be able to carry out vulnerability (authenticated and unauthenticated) scans on almost all IP based systems and analyze the results of the scan to eliminate false positives. The participants will learn to carry out risk based prioritization of findings and recommend security controls. This course will help the participants learn vulnerability management and understand the security posture of their systems using Tenable Nessus and decide on the best course of action for remediation.
Overview of the vulnerability management process
Tenable Nessus introduction