Nessus Manager Training Course
The Nessus vulnerability scanner is a highly adaptable platform designed for detecting and managing vulnerabilities. Its capabilities extend beyond simple vulnerability detection, offering baseline auditing as well, where your system configuration is compared against established hardening standards.
In this instructor-led course, we will introduce the key components of the solution and explore its various functionalities. Each module within the application will be explained, with its specific use cases outlined.
Upon completion of the course, participants will be able to perform authenticated and unauthenticated vulnerability scans on nearly all IP-based systems and analyze the results to eliminate false positives. Participants will also learn to prioritize findings based on risk and recommend compensating controls. This course will equip participants with the skills to assess their systems' security posture using Nessus and determine the most effective remediation strategies.
Audience:
- Infrastructure managers
- System administrators
- System auditors
- System compliance officers
- Vulnerability managers
- Cybersecurity managers
Format:
A mix of lectures, discussions, and hands-on practice
This course is available as onsite live training in Greece or online live training.Course Outline
Overview of Nessus Interface and Navigation
- Installing the Nessus Server and License
- Checking and updating plugins
- Scanning Windows environments
- Utilizing preloaded scan profiles
- Reviewing preinstalled configuration standards
- Navigating the interface
- Configuring notifications
Scanning:
- Executing simple scans
- Running scans from predefined templates
- Creating templates from preloaded plugins
- Conducting asset discovery scans
Understanding Nessus Output:
- Analyzing the Nessus output file
- Comprehending risk ratings and scoring
- Filtering out irrelevant data to streamline output
- Validating findings
- Generating Nessus reports
Detailed Review of Plugins:
- Data discovery plugins
- System-specific plugins
- Compliance plugins
Requirements
Basic understanding of common protocols such as HTTP, HTTPS, SSH, SSL, Telnet, and SFTP
Familiarity with the OSI model layers
Basic knowledge of IP addressing
Open Training Courses require 5+ participants.
Nessus Manager Training Course - Booking
Nessus Manager Training Course - Enquiry
Nessus Manager - Consultancy Enquiry
Testimonials (2)
I generally was benefit from the whole training.
Tassos Papadopoulos
Course - Nessus Manager
The course build up the whole picture and helped me understand in depth how to deal with everyday tasks I perform with Tenable Census Manager.
Konstantinos Papadopoulos
Course - Nessus Manager
Upcoming Courses
Related Courses
Akraino
14 HoursThis instructor-led, live training in Greece (online or onsite) is aimed at programmers who wish to download, install, and set up Akraino Edge Stack blueprints to manage their edge systems.
By the end of this training, participants will be able to install, deploy, manage, and support end-to-end Akraino Edge Stack solutions to improve and organize their edge systems, services, and devices.
Certified Kubernetes Administrator (CKA) - exam preparation
21 HoursThe Certified Kubernetes Administrator (CKA) program was established by The Linux Foundation and the Cloud Native Computing Foundation (CNCF).
Today, Kubernetes stands as a leading platform for container orchestration.
NobleProg has been providing Docker and Kubernetes training since 2015. Having successfully completed over 360 training projects, we have become one of the most recognized training providers globally in the field of containerization.
Since 2019, we have also been assisting our customers in validating their performance within Kubernetes environments by preparing them to pass the CKA and CKAD exams.
This instructor-led, live training (available online or onsite) is designed for System Administrators and Kubernetes users who wish to validate their knowledge by passing the CKA exam.
Additionally, the training focuses on gaining practical experience in Kubernetes Administration; therefore, we recommend participating even if you do not intend to take the CKA exam.
Course Format
- Interactive lectures and discussions.
- Ample exercises and practice opportunities.
- Hands-on implementation in a live laboratory environment.
Course Customization Options
- To request customized training for this course, please contact us to arrange details.
- To learn more about CKA certification, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-administrator-cka
Certified Kubernetes Application Developer (CKAD) - exam preparation
21 HoursThe Certified Kubernetes Application Developer (CKAD) program has been developed by The Linux Foundation and the Cloud Native Computing Foundation (CNCF), the host of Kubernetes.
This instructor-led, live training (online or onsite) is aimed at Developers who wish to confirm their skills in design, build, configure, and expose cloud native applications for Kubernetes.
On the other hand, training is also focused on gaining practical experience in Kubernetes application development, so we recommend taking part in it, even if you don't intend to take CKAD exam.
NobleProg have been delivering Docker & Kubernetes training from 2015. With more than 360 successfully completed training projects, we became one of the best known training company worldwide in field of containerization. Since 2019 we are also helping our customers to confirm their performance in k8s environment by preparing them and encouraging to pass CKA and CKAD exams.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
- To learn more about CKAD, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-application-developer-ckad/
Jitsi Meet: Self-Hosted Video Conferencing Replacing Zoom and Microsoft Teams
14 HoursJitsi Meet is a fully encrypted, 100% open-source video conferencing platform that allows you to host it on your own infrastructure. It offers HD video capabilities, screen sharing, collaborative editing, and live streaming features, all without the need for user accounts or exposing meeting data to third-party services.
This instructor-led training, available both online and onsite, is designed for intermediate DevOps engineers and system administrators looking to deploy Jitsi Meet as a secure alternative to Zoom, Microsoft Teams, and Google Meet.
Upon completing this course, participants will be able to:
- Install and configure Jitsi Meet using either Docker or Debian packages.
- Optimize performance by configuring Prosody, Jicofo, and Jitsi Videobridge.
- Establish TURN servers to ensure NAT traversal and compatibility with firewalls.
- Enhance meeting security through password protection, lobby rooms, and end-to-end encryption.
- Integrate Jitsi with LDAP, Single Sign-On (SSO), and calendar systems.
Course Format
- Interactive lectures and discussions.
- Extensive exercises and practical application.
- Hands-on implementation within a live laboratory environment.
Customization Options for the Course
- For a tailored training experience, please contact us to make arrangements.
LEDE: Set Up a Linux Wireless Router
7 HoursThe LEDE Project (Linux Embedded Development Environment) is a Linux distribution derived from OpenWrt. It serves as a full alternative to the proprietary firmware typically provided by manufacturers for numerous wireless routers and network appliances.
Through this instructor-led live training, participants will acquire the skills necessary to configure a wireless router using LEDE.
Audience
- Network administrators and technicians
Course format
- A blend of lectures, interactive discussions, exercises, and extensive hands-on practice
Matrix + Element: Decentralized Enterprise Chat to Replace Slack and Teams
14 HoursMatrix is an open protocol for secure, decentralized, real-time communication. Organizations are increasingly adopting Matrix with the Element client as an alternative to Slack and Microsoft Teams to maintain end-to-end encryption, on-premise data residency, and federation with external trusted partners.
Network Monitoring Without Vendor Lock-in: LibreNMS and Zabbix
28 HoursThis instructor-led, live training in Greece (online or onsite) is aimed at network and system administrators who wish to implement enterprise-grade network monitoring using open-source tools without vendor dependencies.
By the end of this training, participants will be able to deploy LibreNMS and Zabbix, monitor network devices, create dashboards and alerts, implement distributed monitoring, and integrate with external systems.
Network Security Administrator
35 HoursTarget Audience:
System Administrators, Network Administrators, and professionals interested in defensive network security technologies.
ONAP for Network Orchestration and Automation
28 HoursIn this instructor-led, live training in Greece (online or onsite), participants will learn how to use ONAP to automate networking services.
By the end of this training, participants will be able to:
- Understand, install and configure the various components in the ONAP ecosystem.
- Carry out real-time, policy-driven orchestration and automation of physical and virtual network functions.
- Design, create, orchestrate, and monitor VNFs, SDNs and other network services.
- Efficiently manage the entire networking lifecycle using a software-driven approach.
- Develop, deploy, and scale a network using the latest open source technologies and practices.
OpenUEM Advanced: Automation, Security & Compliance
14 HoursOpenUEM is an open-source endpoint management platform that enables advanced automation, endpoint hardening, and compliance reporting to secure and streamline enterprise operations.
This instructor-led, live training (online or onsite) is aimed at advanced-level IT and security professionals who wish to leverage OpenUEM for automation, security hardening, compliance management, and integration with enterprise monitoring tools.
By the end of this training, participants will be able to:
- Automate endpoint management tasks including software deployment, updates, and reporting.
- Apply security hardening policies and ensure endpoint compliance.
- Integrate OpenUEM with enterprise security and monitoring tools for centralized visibility.
- Generate compliance reports and enforce regulatory or organizational standards.
Format of the Course
- Interactive lecture and discussion.
- Hands-on exercises and practice scenarios.
- Implementation in a lab environment with real endpoints.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
OpenUEM Fundamentals: Endpoint Management Essentials
14 HoursOpenUEM is an open-source unified endpoint management solution that allows organizations to efficiently deploy, configure, and maintain endpoint devices.
This instructor-led live training, available both online and onsite, is designed for IT professionals at the beginner level who want to develop foundational skills in endpoint management using OpenUEM, covering installation, configuration, and basic device administration.
Upon completion of this training, participants will be capable of:
- Installing and configuring the OpenUEM server and agents across various endpoint platforms.
- Enrolling, organizing, and managing endpoints effectively within the OpenUEM console.
- Deploying software, patches, and updates to managed devices.
- Monitoring device health, generating reports, and executing basic troubleshooting tasks.
Course Format
- Interactive lectures and discussions.
- Hands-on exercises and practical scenarios.
- Implementation within a lab environment utilizing real endpoints.
Customization Options
- To request customized training for this course, please contact us to arrange.
OpenUEM Intermediate: Agent Deployment, Inventory & Policy Management
14 HoursOpenUEM is an open-source endpoint management platform that enables organizations to efficiently deploy agents, maintain precise device inventories, and enforce endpoint policies.
This instructor-led, live training (available online or onsite) targets intermediate-level IT professionals seeking to acquire practical skills in deploying agents, managing inventories, and implementing policies across endpoint devices using OpenUEM.
Upon completion of this training, participants will be able to:
- Efficiently deploy OpenUEM agents across various endpoint platforms.
- Maintain and manage accurate asset inventories for all managed devices.
- Create, assign, and enforce policies to ensure compliance and security.
- Effectively distribute software, updates, and patches to endpoints.
Course Format
- Interactive lecture and discussion.
- Hands-on exercises and practice scenarios.
- Implementation in a lab environment with real endpoints.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
OpenStack and NFV (with OVN and OpenFlow)
21 HoursThis course offers comprehensive training on OpenStack networking. It begins by introducing OpenStack and its architecture, followed by an explanation of core OpenStack projects—Identity service (Keystone), Image service (Glance), Compute service (Nova), and Block storage (Cinder)—to outline the ecosystem surrounding OpenStack networks, with a primary focus on the Networking project (Neutron). The curriculum describes virtual network infrastructure based on the Open Virtual Network project, Open vSwitch, and OpenFlow. The objective is to ensure participants understand the fundamental operations and architecture of OpenStack while becoming familiar with the various networking technologies that underpin it, including detailed insights into OVN, underlying flows, resources, and tools.
Customization options
The training can be condensed into a 2-day session focusing on the core aspects most relevant to the customer. Alternatively, the training can be expanded to cover administrative, design, networking, and/or troubleshooting topics related to OpenStack deployments. It is also possible to discuss other underlying SDN solutions, such as Linux Bridge or OvS.
Software-Defined Wide Area Network (SD-WAN) Management and Operation
7 HoursThis instructor-led, live training in Greece (online or onsite) is intended for intermediate-level network professionals seeking to effectively manage and operate SD-WAN networks, encompassing design, configuration, troubleshooting, and optimisation.
By the conclusion of this training, participants will be able to:
- Grasp the fundamental concepts, benefits, and challenges inherent to SD-WAN technologies.
- Design an SD-WAN architecture suited to organisational needs and deploy SD-WAN solutions with efficacy.
- Implement and manage security features within an SD-WAN.
- Monitor, manage, and troubleshoot SD-WAN environments.
Synapse and Element: Self-Hosted Chat Replacing Slack and Microsoft Teams
14 HoursSynapse is the reference homeserver implementation for the Matrix protocol, enabling decentralized, end-to-end encrypted messaging. This instructor-led, live training (online or onsite) targets intermediate DevOps engineers and system administrators who wish to use Synapse and Element to transition from cloud chat platforms to a self-hosted, federated messaging infrastructure.