LinuxCBT.com

Syllabus

Focus: OpenVAS Administration

Duration: 4-Hours

  • OpenVAS | Features | Usage | Implementation

    • Introduction - OpenVAS - Features
      • Explore features and benefits
      • Highlight common usage cases
      • Compare with Nessus Vulnerability Scanner
      • Contrast with NMap and applicable tools
      • Explore topography
      • Explore environment
    •  
    • OpenVAS Installation
      • Identify resources
      • Download applicable binaries
      • Confirm ancillary helper applications
      • Install OpenVAS
      • Initialize installation and test accordingly
      • Ensure persistence across resets
      • Identify key configuraiton objects
      • Compare OpenVAS with traditional tools
      • Identify LOG resources
      • Examine relevant footprint
    •  
    • Explore Defaults
      • Common global directives
      • Identify key directives
      • Identify key interface attributes
      • Note locations of important items
      • Contrast with various tools
      • Discuss applicability of OpenVAS
      • Compare with Nessus Vulnerability Scanner
      • Troubleshoot as needed
    •  
    • Vulnerability Scans
      • Survey landscape
      • Perform ad-hoc scans where applicable
      • Examine results of scans
      • Filter superfluous output and discuss
      • Highlight important detections as per OpenVAS
      • Correlate important findings to industry standards
      • Prep for plan of attack
    •  
    • Selective Scans
      • Discuss applicability
      • Define distinct scans as per requirements
      • Implement selective scans as needed
      • Monitor execution
      • Parse output of various scans
      • Correlate output to live configuration
      • Update configuration as needed
      • Evaluate overall configuration
    •  
    • Reports
      • Highlight capabilities
      • Identify stock reports and dicuss
      • Contrast various reports as supplied
      • Tweak output as needed
      • Filter superfluous output to relegate false-positivies
      • Toggle suppression as needed to expose results
      • Explain advantages of reporting interface
    •  
    • Remediation | MISC
      • Discuss possible tactics
      • Alter configurations of targets to reduce exposure
      • Initiate follow-up scans
      • Explore additional features
      • Correlate to production concerns
      • Patch services where needed to improve posture
      • Ensure settings are permanent
      • Evaluate results
    •  

LinuxCBT OVAS Edition

  •  
DEMO