Vulnerability Scanner Set-up and Configuration, Pt. 2

Students will utilize OpenVAS to identify hosts on a network and assess their vulnerabilities.

Time
1 hour
Difficulty
Intermediate
4.4
Share
NEED TO TRAIN YOUR TEAM? LEARN MORE
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

This Cyberscore is part of a Career Path: Become a Penetration Tester
Overview

CYBRScore's Vulnerability Scanner Set-up and Configuration, Pt. 2 lab is a premium Cybrary lab that teaches students to perform confirmatory assessments of systems or networks according to an audit policy. The CYBRScore Vulnerability Scanner Set-up and Configuration, Pt. 2 Lab is intended for Intermediate level students and learners. CYBRScore's Vulnerability Scanner Set-up and Configuration, Pt. 2 Lab teaches students to conduct Vulnerability Scans using OpenVAS, which includes Port Scanning, Running Services Identification, Service Object Audit, Audit Verification, etc.

The CYBRScore Vulnerability Scanner Set-up and Configuration, Pt. 2 Lab is a continuation or an extension of Vulnerability Scanner Set-up and Configuration Lab which deals with Core Impact and Nessus Tools; both the labs are aimed towards the Vulnerability Assessment Analyst work profile.

Upon successful completion of CYBRScore's Vulnerability Scanner Set-up and Configuration, Pt. 2 lab, the student will be able to identify systemic security issues based on the analysis of vulnerability and configuration data. The CYBRScore Vulnerability Scanner Set-up and Configuration, Pt. 2 lab can also help students improve their programming language implementation and logic. Threat Environment Insights are shared to improve an organization's Risk Management Posture. The enthusiast student also learns to implement the basic CIAAN (Confidentiality, Integrity, Availability, Authentication, Non-Repudiation) IT Security and Privacy Principles as per the organizational requirement. CYBRScore's Vulnerability Scanner Set-up and Configuration, Pt. 2 lab takes most students 1-3 hours to complete.

In CYBRScore's Vulnerability Scanner Set-up and Configuration, Pt. 2 Lab, students will learn about Vulnerability Assessments, which involve conducting confirmatory vulnerability scans and identifying, as well as remediating, vulnerabilities in security systems. This skill is a part of the Vulnerability Assessment Analyst work role and is built upon the ability to identify security threats and issues, based on the vulnerability and configuration data analysis.

In CYBRScore's Vulnerability Scanner Set-up and Configuration, Pt. 2 Lab, students implement the tool OpenVAS which stands for Open Vulnerability Assessment System (originally known as GNessUs) which helps to identify vulnerabilities in the organization's network architecture and perform Risk Assessments. This skill is a part of the Vulnerability Assessment Analyst work role and is built upon the ability to implement Network Scanning and Analysis Tools to identify, mitigate, analyze and remediate the network loopholes, misconfigurations, and vulnerabilities in the organization's network architecture.

In CYBRScore's Vulnerability Scanner Set-up and Configuration, Pt. 2 Lab, the basic IT/Cyber Security Privacy Principles i.e. CIAAN (Confidentiality, Integrity, Availability, Authentication, Non-Repudiation) are reinforced into the student's knowledge database, which benefits organizations in assessing the robustness of security systems and designs. This skill is a part of the Vulnerability Assessment Analyst work role and is built upon the ability to apply the CIAAN basic IT/Cyber Security Privacy Principles to an organization's IT Infrastructure.

In CYBRScore's Vulnerability Scanner Set-up and Configuration, Pt. 2 Lab, students learn to perform a Risk assessment based on the findings from the previous vulnerability audits and determine appropriate mitigation actions. This skill is a part of the Vulnerability Assessment Analyst work role and is built upon the ability to Find, Observe, Record, Assess, Report and fill out the Audit Reports about an organization's IT Infrastructure.

Completion of CYBRScore's Vulnerability Scanner Set-up and Configuration, Pt. 2 lab means that the student has demonstrated the ability to use the manual as well as automated techniques to Identify, Mitigate, Scan, Analyze and Remediate Network Vulnerabilities pertaining to an organization's IT Infrastructure, and assess the Threat Environment on the basis of confirmatory audits verifying the validation of basic IT/Cyber Security CIAAN Privacy Principles.

CYBRScore's Vulnerability Scanner Set-up and Configuration, Pt. 2 Lab is a part of the Vulnerability Assessment Analyst career path presented by Cybrary and the lab is created by CybrScore.

Click the launch button to start the lab.

LEARN MORE. ACHIEVE MORE.

Follow A Path

Deciphering the essentials to enter a new career is hard, so we did it for you!

Focus on building your skills and take this cyberscore in a guided Career Path.

Connect the pieces

Completing a Cyberscore is one thing, mastering the skill is another.

Master the skill and take this cyberscore in an expertly designed Course.

Learning Partner
Comprehensive Learning

See the full benefits of our immersive learning experience with interactive courses and guided career paths.