Vulnerability Scanner Nessus

Practice Labs Module
Time
1 hour
Difficulty
Intermediate

The "Vulnerability Scanner Nessus" module provides you with the instructions and devices to develop your hands-on skills in the following topics: Downloading and Installing Nessus, Configuring Nessus, Scanning with Nessus, Reviewing a Nessus Scan, Saving Nessus Reports.

Start your free 3-day trial and become one of the 3 million Cybersecurity professionals advancing their career goals
Sign up with
OR

Already have an account? Sign In »

Overview

Introduction

The Vulnerability Scanner Nessus module provides you with the instructions and devices to develop your hands-on skills in the following topics.

  • Downloading and Installing Nessus
  • Configuring Nessus
  • Scanning with Nessus
  • Reviewing a Nessus Scan
  • Saving Nessus Reports

Lab time: It will take approximately 1 hour to complete this lab.

Exam Objectives

The following exam objectives are covered in this lab:

  • CS0-001 2.1 Given a scenario, implement an information security vulnerability management process
  • CS0-001 2.2 Given a scenario, analyze the output resulting from a vulnerability scan
  • CS0-001 2.3 Compare and contrast common vulnerabilities found in the following targets within an organization
  • CS0-001 3.2 Given a scenario, prepare a toolkit and use appropriate forensics tools during an investigation - Hashing

Exercise 1 - Downloading and Installing Nessus

Nessus is one of the most trusted vulnerability scanning platforms for auditors and security analysts. Users can schedule scans across multiple scanners, use wizards to easily and quickly create policies, schedule scans and send results via email.

  • Download Nessus
  • Confirm the Hash
  • Install Nessus

Exercise 2 - Configuring Nessus

A basic configuration is required to get Nessus up and running; you will explore this here so that a scan can take place against the network.

  • Perform the configuration

Exercise 3 - Scanning with Nessus

Nessus prevents network attacks by identifying the vulnerabilities and configuration issues that hackers use to penetrate your network. Nessus provides High-Speed Asset Discovery, Vulnerability Assessment, broad coverage, and profiling. You will be performing a basic network scan and then using the details to understand the system vulnerabilities.

  • Basic Scanning

Exercise 4 - Reviewing a Nessus Scan

Based on permissions and the scan’s actions, you can Configure the scan, search the scan’s Audit Trail, Launch the scan, or Export the scan’s results.

Nessus outputs these details to the 3 different main formats which are HTML, Nessus, CSV and Nessus DB.

  • Reviewing the results of a Nessus scan

Exercise 5 - Saving Nessus Reports

Saving the files to provide an audit trail and review any remediations is critical. These files might need to be passed to another member of the team or onto someone to implement the controls.

  • Saving reports
Delivered By
Comprehensive Learning

See the full benefits of our immersive learning experience with interactive courses and guided career paths.