How do you detect vulnerabilities that exist in a network or on a system? Start your career today! ➡️ The ability to identify vulnerabilities and to track them throughout their life cycle is crucial to maintaining a secure network. According to the CIS 20 Controls, Continuous Vulnerability Management is the third most important and basic control that you should have in your network. Unfortunately, vulnerability detection and vulnerability management can be two very time-consuming processes in Cyber Security. Luckily, there are tools that we can use to automate the discovery process. Nessus is arguably the most well-known vulnerability scanning tool in the market. As a result, if there is one scanner you should be familiar with then it’s Nessus. In this video, we will walk through the Nessus Vulnerability Scanner. We will cover everything from the installation process and running your first vulnerability scan. I highly encourage you to follow along in your home lab to help build your skills with Nessus. Remember you should only scan networks that you have WRITTEN authorization to do so. Nessus Essentials Download: Practical Vulnerability Management: Vulnerability Management: Security Risk Management: ============================= Popular Cybersecurity Resources ============================= Train With Me ➡️ Stay Current on the Latest Threats➡️ My Studio Gear ➡️ ============================= Today’s Video Sponsor ============================= Cyber Training Pro ➡️ ---------------------------------------------- Are you interested in sponsoring content? ➡️ ============================= Connect with me! ============================= LinkedIn: ➡︎ Twitter: ➡︎ Instagram: ➡︎ ============================= ⏰ Timecodes ⏰ ============================= 0:00 Introduction 1:25 CIS Top 20 Controls 2:28 Nessus Introduction 3:51 Nessus Installation 8:03 Discovery Scan 8:31 Basic Nessus Scan 8:58 Review Findings 10:49 CVE Findings 11:49 Question of the Day 12:03 Final Comments ============================= #TenableNessus #VulnerabilityManagement #VulnerabilityScanner DISCLAIMER: I am an ambassador or affiliate for many brands referenced on the channel. As an Amazon Associate, I earn a commission from qualifying purchases. DISCLAIMER (MUSIC): I only use royalty-free music and sound effects.











