You are using an outdated browser. For a faster, safer browsing experience, upgrade for free today.

Details

Release Info

OpenVAS provides a Nessus fork that can help you to expose potential vulnerabilities in your environment. Beyond reconnaissance, OpenVAS drills deeper, with many more probes, to help you assess your organizational risk-profile. Use it to report more intelligently on what potentially lurks in your environment.

Release Syllabus

OpenVAS Administration

OpenVAS | Features | Usage | Implementation

  • Introduction - OpenVAS - Features
    • Explore features and benefits
    • Highlight common usage cases
    • Compare with Nessus Vulnerability Scanner
    • Contrast with NMap and applicable tools
    • Explore topography
    • Explore environment
  •  
  • OpenVAS Installation
    • Identify resources
    • Download applicable binaries
    • Confirm ancillary helper applications
    • Install OpenVAS
    • Initialize installation and test accordingly
    • Ensure persistence across resets
    • Identify key configuraiton objects
    • Compare OpenVAS with traditional tools
    • Identify LOG resources
    • Examine relevant footprint
  •  
  • Explore Defaults
    • Common global directives
    • Identify key directives
    • Identify key interface attributes
    • Note locations of important items
    • Contrast with various tools
    • Discuss applicability of OpenVAS
    • Compare with Nessus Vulnerability Scanner
    • Troubleshoot as needed
  •  
  • Vulnerability Scans
    • Survey landscape
    • Perform ad-hoc scans where applicable
    • Examine results of scans
    • Filter superfluous output and discuss
    • Highlight important detections as per OpenVAS
    • Correlate important findings to industry standards
    • Prep for plan of attack
  •  
  • Selective Scans
    • Discuss applicability
    • Define distinct scans as per requirements
    • Implement selective scans as needed
    • Monitor execution
    • Parse output of various scans
    • Correlate output to live configuration
    • Update configuration as needed
    • Evaluate overall configuration
  •  
  • Reports
    • Highlight capabilities
    • Identify stock reports and dicuss
    • Contrast various reports as supplied
    • Tweak output as needed
    • Filter superfluous output to relegate false-positivies
    • Toggle suppression as needed to expose results
    • Explain advantages of reporting interface
  •  
  • Remediation | MISC
    • Discuss possible tactics
    • Alter configurations of targets to reduce exposure
    • Initiate follow-up scans
    • Explore additional features
    • Correlate to production concerns
    • Patch services where needed to improve posture
    • Ensure settings are permanent
    • Evaluate results
  •  

Tokyo Time

16:9

Rate

1.25x

Watched

1

Completed

1 of 5