Nessus Manager Training Course
The Nessus vulnerability scanner serves as a highly adaptable platform for identifying and managing security weaknesses. Its capabilities extend beyond mere vulnerability detection, also encompassing baseline auditing. This involves comparing your system configurations against established hardening best practices.
Through this instructor-led course, we will introduce the solution's key components and various functionalities. Each module within the application will be thoroughly explained, with its practical use cases clearly outlined.
By the end of the course, participants will be equipped to perform both authenticated and unauthenticated vulnerability scans across nearly all IP-based systems. They will learn to analyze scan results to filter out false positives, prioritize findings based on risk, and recommend appropriate compensating controls. This training will empower participants to assess their systems' security posture using Nessus and determine the most effective remediation strategies.
Audience:
- Infrastructure managers
- System administrators
- System auditors
- System compliance officers
- Vulnerability managers
- Cybersecurity managers
Format:
A blend of lectures, discussions, and hands-on practice
This course is available as onsite live training in Malaysia or online live training.Course Outline
Overview of Nessus Interface and Navigation
- Installing the Nessus Server and configuring the license
- Reviewing and updating plugins
- Conducting scans on Windows systems
- Utilizing preloaded scan profiles
- Exploring preinstalled configuration standards
- Navigating the interface
- Configuring notifications
Scanning Techniques:
- Executing simple scans
- Running scans from predefined templates
- Creating templates from preloaded plugins
- Performing asset discovery scans
Understanding Nessus Output:
- Interpreting the Nessus output file
- Understanding risk ratings and scoring mechanisms
- Filtering out irrelevant data to streamline output
- Validating findings
- Generating Nessus reports
Detailed Review of Plugins:
- Data discovery plugins
- System-specific plugins
- Compliance plugins
Requirements
Foundational knowledge of common protocols such as HTTP, HTTPS, SSH, SSL, Telnet, and SFTP
Basic understanding of the OSI model layers
Basic knowledge of IP addressing
Open Training Courses require 5+ participants.
Nessus Manager Training Course - Booking
Nessus Manager Training Course - Enquiry
Nessus Manager - Consultancy Enquiry
Testimonials (2)
I generally was benefit from the whole training.
Tassos Papadopoulos
Course - Nessus Manager
The course build up the whole picture and helped me understand in depth how to deal with everyday tasks I perform with Tenable Census Manager.
Konstantinos Papadopoulos
Course - Nessus Manager
Upcoming Courses
Related Courses
Akraino
14 HoursThis instructor-led, live training in Malaysia (online or onsite) is designed for developers who want to download, install, and configure Akraino Edge Stack blueprints to manage their edge systems.
Upon completion of this training, participants will be able to install, deploy, manage, and support end-to-end Akraino Edge Stack solutions to optimise and organise their edge systems, services, and devices.
Certified Kubernetes Administrator (CKA) - exam preparation
21 HoursThe Certified Kubernetes Administrator (CKA) programme was established by The Linux Foundation and the Cloud Native Computing Foundation (CNCF).
Kubernetes has emerged as the premier platform for container orchestration.
NobleProg has been delivering Docker and Kubernetes training since 2015. With over 360 successfully completed training projects, we have established ourselves as one of the leading training providers globally in the field of containerization.
Since 2019, we have also supported our clients in validating their proficiency in Kubernetes environments by preparing them and encouraging them to take the CKA and CKAD exams.
This instructor-led, live training (available online or onsite) is designed for System Administrators and Kubernetes users who wish to validate their knowledge by passing the CKA exam.
Additionally, the training focuses on gaining practical experience in Kubernetes Administration; therefore, we recommend participation even if you do not intend to sit for the CKA exam.
Course Format
- Interactive lectures and discussions.
- Extensive exercises and practice sessions.
- Hands-on implementation in a live lab environment.
Course Customization Options
- To request customized training for this course, please contact us to make arrangements.
- For more information about CKA certification, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-administrator-cka
Certified Kubernetes Application Developer (CKAD) - exam preparation
21 HoursThe Certified Kubernetes Application Developer (CKAD) programme has been established by The Linux Foundation and the Cloud Native Computing Foundation (CNCF), which hosts Kubernetes.
This instructor-led, live training (available online or onsite) is designed for Developers who wish to validate their skills in designing, building, configuring, and exposing cloud native applications for Kubernetes.
Additionally, the training focuses on gaining practical experience in Kubernetes application development. Therefore, we recommend participating even if you do not intend to take the CKAD exam.
NobleProg has been delivering Docker & Kubernetes training since 2015. With more than 360 successfully completed training projects, we have become one of the most renowned training companies globally in the field of containerization. Since 2019, we have also assisted our customers in validating their performance in the k8s environment by preparing them and encouraging them to pass the CKA and CKAD exams.
Course Format
- Interactive lecture and discussion.
- Ample exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request customized training for this course, please contact us to arrange.
- To learn more about CKAD, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-application-developer-ckad/
Jitsi Meet: Self-Hosted Video Conferencing Replacing Zoom and Microsoft Teams
14 HoursJitsi Meet is a fully encrypted, 100% open-source video conferencing platform that you can self-host on your own servers. It supports HD video, screen sharing, collaborative editing, and live streaming without requiring user accounts or exposing meeting data to third-party platforms.
This instructor-led, live training (available online or onsite) is designed for intermediate DevOps professionals and system administrators who wish to deploy Jitsi Meet as a sovereign alternative to Zoom, Microsoft Teams, and Google Meet.
Upon completing this training, participants will be able to:
- Install and configure Jitsi Meet using Docker or Debian packages.
- Configure Prosody, Jicofo, and Jitsi Videobridge for optimal performance.
- Set up TURN servers to ensure NAT traversal and firewall compatibility.
- Secure meetings with passwords, lobby rooms, and end-to-end encryption.
- Integrate Jitsi with LDAP, SSO, and calendar systems.
Course Format
- Interactive lectures and discussions.
- Ample exercises and practice sessions.
- Hands-on implementation in a live-lab environment.
Customization Options
- To request customized training for this course, please contact us to arrange.
LEDE: Set Up a Linux Wireless Router
7 HoursThe LEDE Project (Linux Embedded Development Environment) is a Linux-based operating system derived from OpenWrt. It serves as a comprehensive alternative to the proprietary firmware typically supplied by manufacturers for a broad spectrum of wireless routers and non-network devices.
In this instructor-led live training, participants will gain the skills needed to configure a LEDE-based wireless router.
Target Audience
- Network administrators and technicians
Course Format
- A blend of lectures, discussions, practical exercises, and extensive hands-on practice
Matrix + Element: Decentralized Enterprise Chat to Replace Slack and Teams
14 HoursMatrix serves as an open protocol designed for secure, decentralized, real-time communication. Organizations are increasingly adopting Matrix, used with the Element client, as a viable alternative to Slack and Microsoft Teams. This adoption supports the maintenance of end-to-end encryption, ensures data residency on-premises, and facilitates federation with external trusted partners.
Network Monitoring Without Vendor Lock-in: LibreNMS and Zabbix
28 HoursThis instructor-led, live training in Malaysia (online or onsite) is aimed at network and system administrators who wish to implement enterprise-grade network monitoring using open-source tools without vendor dependencies.
By the end of this training, participants will be able to deploy LibreNMS and Zabbix, monitor network devices, create dashboards and alerts, implement distributed monitoring, and integrate with external systems.
Network Security Administrator
35 HoursTarget Audience:
This course is designed for System Administrators, Network Administrators, and any professionals keen on mastering defensive network security technologies.
ONAP for Network Orchestration and Automation
28 HoursIn this instructor-led, live training in Malaysia (online or onsite), participants will learn how to use ONAP to automate networking services.
By the end of this training, participants will be able to:
- Understand, install and configure the various components in the ONAP ecosystem.
- Carry out real-time, policy-driven orchestration and automation of physical and virtual network functions.
- Design, create, orchestrate, and monitor VNFs, SDNs and other network services.
- Efficiently manage the entire networking lifecycle using a software-driven approach.
- Develop, deploy, and scale a network using the latest open source technologies and practices.
OpenUEM Advanced: Automation, Security & Compliance
14 HoursOpenUEM is an open-source endpoint management platform that enables advanced automation, endpoint hardening, and compliance reporting to secure and streamline enterprise operations.
This instructor-led, live training (online or onsite) is aimed at advanced-level IT and security professionals who wish to leverage OpenUEM for automation, security hardening, compliance management, and integration with enterprise monitoring tools.
By the end of this training, participants will be able to:
- Automate endpoint management tasks including software deployment, updates, and reporting.
- Apply security hardening policies and ensure endpoint compliance.
- Integrate OpenUEM with enterprise security and monitoring tools for centralized visibility.
- Generate compliance reports and enforce regulatory or organizational standards.
Format of the Course
- Interactive lecture and discussion.
- Hands-on exercises and practice scenarios.
- Implementation in a lab environment with real endpoints.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
OpenUEM Fundamentals: Endpoint Management Essentials
14 HoursOpenUEM is an open-source unified endpoint management platform that allows organisations to efficiently deploy, configure, and maintain endpoint devices.
This instructor-led live training (available online or onsite) is designed for beginner-level IT professionals seeking to build foundational skills in managing endpoints with OpenUEM, covering installation, configuration, and basic device management.
Upon completion of this training, participants will be able to:
- Install and configure the OpenUEM server and agents across various endpoint platforms.
- Enroll, organise, and manage endpoints effectively within the OpenUEM console.
- Deploy software, patches, and updates to managed devices.
- Monitor device health, generate reports, and perform basic troubleshooting tasks.
Course Format
- Interactive lectures and discussions.
- Hands-on exercises and practical scenarios.
- Implementation in a lab environment using real endpoints.
Course Customization Options
- To request customized training for this course, please contact us to arrange.
OpenUEM Intermediate: Agent Deployment, Inventory & Policy Management
14 HoursOpenUEM serves as an open-source endpoint management platform that enables organisations to efficiently deploy agents, maintain precise device inventories, and enforce endpoint policies.
This instructor-led, live training (available online or onsite) is designed for intermediate-level IT professionals seeking to acquire practical skills in deploying agents, managing inventories, and implementing policies across endpoint devices using OpenUEM.
Upon completion of this training, participants will be capable of:
- Deploying OpenUEM agents effectively across various endpoint platforms.
- Maintaining and managing accurate asset inventories for all managed devices.
- Creating, assigning, and enforcing policies to ensure compliance and security.
- Distributing software, updates, and patches to endpoints efficiently.
Course Format
- Interactive lectures and discussions.
- Hands-on exercises and practice scenarios.
- Implementation in a lab environment using real endpoints.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
OpenStack and NFV (with OVN and OpenFlow)
21 HoursThis course offers in-depth training on OpenStack networking. It begins by introducing OpenStack and its architecture, then clarifies core OpenStack projects as Identity service (Keystone), Image service (Glance), Compute service (Nova), Block storage (Cinder) in order to describe the surroundings of the networks in OpenStack and mainly focus on Networking project (Neutron). Virtual network infrastructure is described and based on the Open Virtual Network project, Open vSwitch and OpenFlow. The goal of the course is to understand basic operations and architecture of OpenStack as well as to familiarize participants with various networking technologies behind OpenStack, extending information about OVN and underlying flows, resources and tools.
Customization options
The training can be contracted to 2 days, focusing on core aspects relevant for the customer. The training can be also extended regarding administrative, design, networking and/or troubleshooting topics concerning OpenStack deployments. It is possible to describe other underlying SDN solutions like Linux Bridge or OvS.
Software-Defined Wide Area Network (SD-WAN) Management and Operation
7 HoursThis instructor-led, live training in Malaysia (online or onsite) caters to intermediate-level network professionals seeking to effectively manage and operate SD-WAN networks, encompassing design, configuration, troubleshooting, and optimization.
Upon completion of this training, participants will be capable of:
- Gaining insight into the core concepts, advantages, and challenges inherent to SD-WAN technologies.
- Designing an SD-WAN architecture that aligns with organizational requirements and deploying SD-WAN solutions efficiently.
- Implementing and managing security protocols within an SD-WAN environment.
- Monitoring, managing, and troubleshooting SD-WAN ecosystems.
Synapse and Element: Self-Hosted Chat Replacing Slack and Microsoft Teams
14 HoursSynapse is the reference homeserver implementation for the Matrix protocol, enabling decentralized, end-to-end encrypted messaging. This instructor-led live training (online or onsite) targets intermediate DevOps engineers and system administrators who aim to use Synapse and Element to replace cloud chat platforms with a self-hosted, federated messaging infrastructure.