eBooks-it.org Logo
eBooks-IT.org Inner Image

Learning Nessus for Penetration Testing

Learning Nessus for Penetration Testing Image

Book Details:

Publisher:Packt Publishing
Series: Packt , Learning
Author:Himanshu Kumar
Edition:1
ISBN-10:1783550996
ISBN-13:9781783550999
Pages:116
Published:Jan 24 2014
Posted:Nov 19 2014
Language:English
Book format:PDF
Book size:2.43 MB

Book Description:

Master how to perform IT infrastructure security vulnerability assessments using Nessus with tips and insights from real-world challenges faced during vulnerability assessment Overview Understand the basics of vulnerability assessment and penetration testing as well as the different types of testing Successfully install Nessus and configure scanning options Learn useful tips based on real-world issues faced during scanning Use Nessus for compliance checks In Detail IT security is a vast and exciting domain, with vulnerability assessment and penetration testing being the most important and commonly performed security activities across organizations today. The Nessus tool gives the end user the ability to perform these kinds of security tests quickly and effectively. Nessus is a widely used tool for vulnerability assessment, and Learning Nessus for Penetration Testing gives you a comprehensive insight into the use of this tool. This book is a step-by-step guide that will teach you about the various options available in the Nessus vulnerability scanner tool so you can conduct a vulnerability assessment that helps to identify exposures in IT infrastructure quickly and efficiently. This book will also give you an insight into penetration testing and how to conduct compliance checks using Nessus. This book starts off with an introduction to vulnerability assessment and penetration testing before moving on to show you the steps needed to install Nessus on Windows and Linux platforms. Throughout the course of this book, you will learn about the various administrative options available in Nessus such as how to create a new user. You will also learn about important concepts like how to analyze results to remove false positives and criticality. At the end of this book, you will also be introduced to the compliance check feature of Nessus and given an insight into how it is different from regular vulnerability scanning. Learning Nessus for Penetration Testing teaches you everything you need to know about how to perform VA/PT effectively using Nessus to secure your IT infrastructure and to meet compliance requirements in an effective and efficient manner. What you will learn from this book Understand the basics of vulnerability assessment and penetration testing Install Nessus on Windows and Linux platforms Set up a scan policy based on the type of infrastructure you are scanning Configure a scan by choosing the right policy and options Understand the difference between credentialed and non-credentialed scans Analyze results from a severity, applicability, and false positive perspective Perform penetration tests using Nessus output Perform compliance checks using Nessus and understand the difference between compliance checks and vulnerability assessment Approach This book is a friendly tutorial that uses several examples of real-world scanning and exploitation processes which will help get you on the road to becoming an expert penetration tester. Who this book is written for Learning Nessus for Penetration Testing is ideal for security professionals and network administrators who wish to learn how to use Nessus to conduct vulnerability assessments to identify vulnerabilities in IT infrastructure quickly and efficiently.

Download Link:

Related Books:

The Basics of Hacking and Penetration Testing

Ethical Hacking and Penetration Testing Made Easy
The Basics of Hacking and Penetration Testing Image
2nd Edition
The Basics of Hacking and Penetration Testing, 2nd Ed. serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. No prior hacking experience is needed. You will learn how to properly utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Tool coverage includes Backtrack and Kali Linux, Google reconnaissance, MetaGooFil, DNS interrogation, Nmap, Nessus, Metasploit, the Social Engineer Toolkit (SET) , w3af, Netcat, post exploitation tactics, the Hacker Defender rootkit, and more. The book provides a simple and clean explanatio...

Professional Penetration Testing

Creating and Learning in a Hacking Lab
Professional Penetration Testing Image
2nd Edition
Professional Penetration Testing walks you through the entire process of setting up and running a pen test lab. Penetration testing-the act of testing a computer network to find security vulnerabilities before they are maliciously exploited-is a crucial component of information security in any organization. With this book, you will find out how to turn hacking skills into a professional career. Chapters cover planning, metrics, and methodologies; the details of running a pen test, including identifying and verifying vulnerabilities; and archiving, reporting and management practices. Author Thomas Wilhelm has delivered penetration testing training to c...

Mastering Kali Linux for Advanced Penetration Testing

Mastering Kali Linux for Advanced Penetration Testing Image
A practical guide to testing your network's security with Kali Linux - the preferred choice of penetration testers and hackers Overview Conduct realistic and effective security tests on your network Demonstrate how key data systems are stealthily exploited, and learn how to identify attacks against your own systems Use hands-on techniques to take advantage of Kali Linux, the open source framework of security tools In Detail Mastering Kali Linux for Advanced Penetration Testing will teach you the kill chain perspective in assessing network security - from selecting the most effective tools, to rapidly compromising network security, to highlighting the techniques used to avoid detection. This book will take you, as a tester, through the reconnaissanc...



2007 - 2021 © eBooks-IT.org