Nessus Manager Training Course
The Nessus vulnerability scanner is a highly versatile platform designed for detecting and managing security gaps. Beyond standard vulnerability detection, it supports baseline auditing, allowing you to compare system configurations against established hardening standards.
During this instructor-led course, we will explore the solution's core components and diverse functionalities. Each module within the application will be thoroughly explained, with its practical use cases clearly outlined.
By the end of the training, participants will be capable of conducting both authenticated and unauthenticated vulnerability scans across nearly all IP-based systems. You will learn to analyze scan results to eliminate false positives, prioritize findings based on risk, and recommend compensating controls. This course empowers participants to assess their system security posture using Nessus and determine the most effective remediation strategies.
Audience:
- Infrastructure managers
- System administrators
- System auditors
- System compliance officers
- Vulnerability managers
- Cybersecurity managers
Format:
A blend of lectures, interactive discussions, and hands-on practice
This course is available as onsite live training in Italy or online live training.Course Outline
Overview of Nessus Interface and Navigation
- Installing the Nessus Server and configuring the license
- Verifying and updating plugins
- Scanning Windows environments
- Utilizing preloaded scan profiles
- Reviewing preinstalled configuration standards
- Navigating the interface
- Configuring notifications
Scanning:
- Executing simple scans
- Running scans from predefined templates
- Creating custom templates using preloaded plugins
- Performing asset discovery scans
Understanding Nessus Output:
- Interpreting Nessus output files
- Understanding risk ratings and scoring mechanisms
- Filtering unnecessary data to streamline output
- Validating identified findings
- Generating Nessus reports
Detailed Review of Plugins:
- Data discovery plugins
- System-specific plugins
- Compliance plugins
Requirements
Foundational knowledge of common protocols such as HTTP, HTTPS, SSH, SSL, Telnet, and SFTP
Familiarity with the OSI model layers
Understanding of IP addressing concepts
Open Training Courses require 5+ participants.
Nessus Manager Training Course - Booking
Nessus Manager Training Course - Enquiry
Nessus Manager - Consultancy Enquiry
Testimonials (2)
I generally was benefit from the whole training.
Tassos Papadopoulos
Course - Nessus Manager
The course build up the whole picture and helped me understand in depth how to deal with everyday tasks I perform with Tenable Census Manager.
Konstantinos Papadopoulos
Course - Nessus Manager
Upcoming Courses
Related Courses
Akraino
14 HoursThis instructor-led, live training in Italy (online or onsite) is aimed at programmers who wish to download, install, and set up Akraino Edge Stack blueprints to manage their edge systems.
By the end of this training, participants will be able to install, deploy, manage, and support end-to-end Akraino Edge Stack solutions to improve and organize their edge systems, services, and devices.
Certified Kubernetes Administrator (CKA) - exam preparation
21 HoursThe Certified Kubernetes Administrator (CKA) program was established by The Linux Foundation and the Cloud Native Computing Foundation (CNCF).
Kubernetes has become a leading platform for container orchestration.
Since 2015, NobleProg has been providing Docker and Kubernetes training. With over 360 successfully completed training projects, we have established ourselves as one of the most recognized training providers globally in the field of containerization.
Since 2019, we have also been supporting our customers in validating their skills in k8s environments by preparing them and encouraging them to take the CKA and CKAD exams.
This instructor-led, live training (available online or onsite) is designed for System Administrators and Kubernetes users who wish to validate their knowledge by passing the CKA exam.
Moreover, the training focuses on gaining practical experience in Kubernetes Administration, so we recommend participating even if you do not plan to take the CKA exam.
Course Format
- Interactive lectures and discussions.
- Abundant exercises and practice sessions.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request customized training for this course, please contact us to arrange.
- To learn more about CKA certification, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-administrator-cka
Certified Kubernetes Application Developer (CKAD) - exam preparation
21 HoursThe Certified Kubernetes Application Developer (CKAD) certification program was created by The Linux Foundation and the Cloud Native Computing Foundation (CNCF), the organization responsible for hosting Kubernetes.
This instructor-led, live training (available online or in-person) is designed for developers looking to validate their ability to design, build, configure, and expose cloud-native applications on Kubernetes.
Additionally, the training emphasizes gaining practical experience in Kubernetes application development. Therefore, we recommend participating even if you do not plan to take the CKAD exam.
NobleProg has been providing Docker and Kubernetes training since 2015. With over 360 successfully completed training projects, we have become one of the most renowned training providers globally in the field of containerization. Since 2019, we have also been assisting our customers in validating their performance in Kubernetes environments by preparing them to pass the CKA and CKAD exams.
Course Format
- Interactive lectures and discussions.
- Extensive exercises and practice sessions.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request customized training for this course, please contact us to arrange.
- To learn more about CKAD, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-application-developer-ckad/
LEDE: Set Up a Linux Wireless Router
7 HoursThe LEDE Project (Linux Embedded Development Environment) is a Linux operating system derived from OpenWrt. It serves as a comprehensive substitute for the proprietary firmware typically provided by manufacturers for various wireless routers and non-networking devices.
During this instructor-led live training, participants will gain the skills necessary to configure a wireless router running LEDE.
Audience
- Network administrators and technicians
Course Format
- A blend of lectures, discussions, exercises, and extensive hands-on practice
Network Monitoring Without Vendor Lock-in: LibreNMS and Zabbix
28 HoursThis instructor-led, live training in Italy (online or onsite) is designed for network and system administrators who wish to implement enterprise-grade network monitoring using open-source tools without vendor dependencies.
By the end of this training, participants will be able to deploy LibreNMS and Zabbix, monitor network devices, create dashboards and alerts, implement distributed monitoring, and integrate with external systems.
Network Security Administrator
35 HoursTarget Audience:
This course is designed for System Administrators, Network Administrators, and any professionals interested in defensive network security technologies.
ONAP for Network Orchestration and Automation
28 HoursIn this instructor-led live training Italy (online or onsite), participants will learn how to use ONAP to automate networking services.
By the end of this training, participants will be able to:
- Understand, install and configure the various components in the ONAP ecosystem.
- Carry out real-time, policy-driven orchestration and automation of physical and virtual network functions.
- Design, create, orchestrate, and monitor VNFs, SDNs and other network services.
- Efficiently manage the entire networking lifecycle using a software-driven approach.
- Develop, deploy, and scale a network using the latest open source technologies and practices.
OpenUEM Advanced: Automation, Security & Compliance
14 HoursOpenUEM is an open-source endpoint management platform that enables advanced automation, endpoint hardening, and compliance reporting to secure and streamline enterprise operations.
This instructor-led, live training (online or onsite) is aimed at advanced-level IT and security professionals who wish to leverage OpenUEM for automation, security hardening, compliance management, and integration with enterprise monitoring tools.
By the end of this training, participants will be able to:
- Automate endpoint management tasks including software deployment, updates, and reporting.
- Apply security hardening policies and ensure endpoint compliance.
- Integrate OpenUEM with enterprise security and monitoring tools for centralized visibility.
- Generate compliance reports and enforce regulatory or organizational standards.
Format of the Course
- Interactive lecture and discussion.
- Hands-on exercises and practice scenarios.
- Implementation in a lab environment with real endpoints.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
OpenUEM Fundamentals: Endpoint Management Essentials
14 HoursOpenUEM is an open-source unified endpoint management platform that empowers organizations to efficiently deploy, configure, and maintain their endpoint devices.
This instructor-led live training, available online or onsite, is designed for beginner-level IT professionals seeking to build foundational skills in endpoint management with OpenUEM. The curriculum covers installation, configuration, and fundamental device management techniques.
Upon completion of this training, participants will be able to:
- Install and configure the OpenUEM server and agents across various endpoint platforms.
- Enroll, organize, and manage endpoints effectively within the OpenUEM console.
- Deploy software, patches, and updates to managed devices.
- Monitor device health, generate reports, and execute basic troubleshooting tasks.
Course Format
- Interactive lectures and discussions.
- Hands-on exercises and practical scenarios.
- Implementation exercises in a lab environment using real endpoints.
Course Customization Options
- To request customized training for this course, please contact us to make arrangements.
OpenUEM Intermediate: Agent Deployment, Inventory & Policy Management
14 HoursOpenUEM is an open-source endpoint management platform that enables organizations to efficiently deploy agents, maintain precise device inventories, and enforce endpoint policies.
This instructor-led, live training (available online or onsite) is designed for intermediate-level IT professionals seeking practical skills in deploying agents, managing inventories, and implementing policies across endpoint devices using OpenUEM.
Upon completing this training, participants will be able to:
- Efficiently deploy OpenUEM agents across multiple endpoint platforms.
- Maintain and manage accurate asset inventories for all managed devices.
- Create, assign, and enforce policies to ensure compliance and security.
- Effectively distribute software, updates, and patches to endpoints.
Format of the Course
- Interactive lecture and discussion.
- Hands-on exercises and practice scenarios.
- Implementation in a lab environment with real endpoints.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
OpenStack and NFV (with OVN and OpenFlow)
21 HoursThis training offers an in-depth exploration of OpenStack networking. The curriculum begins with an introduction to OpenStack and its architecture, followed by a detailed examination of core OpenStack projects: the Identity service (Keystone), Image service (Glance), Compute service (Nova), and Block storage (Cinder). This establishes the context for understanding the networking environment within OpenStack, with a primary focus on the Networking project (Neutron). The course describes virtual network infrastructure based on the Open Virtual Network project, utilizing Open vSwitch and OpenFlow. Participants will learn the fundamental operations and architecture of OpenStack, while becoming familiar with the diverse networking technologies that underpin it. Additional insights will be provided regarding OVN, including its underlying flows, resources, and tools.
Customization options
The training can be condensed into a 2-day format, focusing on core aspects relevant to the customer. Alternatively, the training can be expanded to cover administrative, design, networking, and/or troubleshooting topics specific to OpenStack deployments. It is also possible to include coverage of other underlying SDN solutions, such as Linux Bridge or OvS.
Software-Defined Wide Area Network (SD-WAN) Management and Operation
7 HoursThis instructor-led, live training in Italy (online or onsite) targets intermediate-level network professionals who aim to effectively manage and operate SD-WAN networks, including design, configuration, troubleshooting, and optimization.
By the end of this training, participants will be able to:
- Understand the fundamental concepts, benefits, and challenges associated with SD-WAN technologies.
- Design an SD-WAN architecture tailored to organizational needs and deploy SD-WAN solutions effectively.
- Implement and manage security features within an SD-WAN.
- Monitor, manage, and troubleshoot SD-WAN environments.
Varnish: Speeding Up Your Website with HTTP Reverse Proxy Caching
7 HoursVarnish serves as a reverse proxy tailored for dynamic, content-intensive websites. Distinct from Squid, which originated as a client-side cache, or web servers like Apache and nginx, Varnish was engineered specifically as an HTTP accelerator. While other proxy servers typically support various protocols such as FTP and SMTP, Varnish focuses exclusively on HTTP. It is widely utilized by prominent high-traffic platforms including Wikipedia, The New York Times, Facebook, and Twitter.
Through this course, participants will explore Varnish’s features and caching methodologies while gaining practical experience in setting up and configuring a Varnish proxy on Linux. The training begins with a review of essential networking principles, then progresses through setup and configuration topics toward more complex implementations. Upon completion, attendees will understand the optimal scenarios for deploying Varnish and will possess the hands-on expertise required to implement their own Varnish proxy solutions.
Audience
- Network technicians
- Network designers
- System administrators
Course Format
- A blend of lectures and discussions, with a strong emphasis on hands-on practice and implementation, supplemented by occasional quizzes to track progress
Network Troubleshooting with Wireshark
21 HoursNetwork packet analysis is a technique employed to observe, in real time, the raw data transmitted and received via a network interface. This practice is invaluable for diagnosing issues related to network configuration and application performance. Wireshark, a free and open-source packet analyzer, is widely used to resolve such network challenges.
During this instructor-led live training, participants will acquire the skills to utilize Wireshark for troubleshooting network functionality and evaluating the performance of various networked applications. Attendees will grasp key principles of network troubleshooting and gain practical experience in capturing and analyzing TCP/IP request and response traffic exchanged between clients and servers.
Upon completion of this training, participants will be equipped to:
- Evaluate network functionality and performance across diverse environments and conditions
- Assess whether instances of different server applications are operating within acceptable performance parameters
- Pinpoint the primary sources of network performance degradation
- Identify and resolve the most frequent causes of performance issues in TCP/IP communications
Audience
- Network engineers
- Network and computer technicians
Format of the Course
- A blend of lectures, discussions, exercises, and extensive hands-on practice
Note
- To request customized training for this course, please contact us to make arrangements.