Nessus Manager Training Course
The Nessus vulnerability scanner is a highly versatile platform designed for detecting and managing vulnerabilities. Its capabilities extend beyond simple vulnerability detection to include baseline auditing, where system configurations are compared against established hardening standards.
In this instructor-led course, we will introduce the core components of the solution and explore its various functionalities. Each module within the application will be explained, with its specific use cases clearly outlined.
By the end of the course, participants will be equipped to perform both authenticated and unauthenticated vulnerability scans on nearly all IP-based systems. They will learn to analyze scan results to eliminate false positives, prioritize findings based on risk, and recommend appropriate compensating controls. This training will enable participants to assess the security posture of their systems using Nessus and determine the best remediation strategies.
Audience:
- Infrastructure managers
- System administrators
- System auditors
- System compliance officers
- Vulnerability managers
- Cybersecurity managers
Format:
A combination of lectures, discussions, and hands-on practice.
This course is available as onsite live training in Uzbekistan or online live training.Course Outline
Overview of Nessus Interface and Navigation
- Installing Nessus Server and activating the license
- Checking and updating plugins
- Scanning Windows environments
- Using preloaded scan profiles
- Walkthrough of preinstalled configuration standards
- Navigating the interface
- Setting up notifications
Scanning:
- Running simple scans
- Executing scans from predefined templates
- Creating templates from preloaded plugins
- Performing asset discovery scans
Understanding Nessus Output:
- Interpreting the Nessus output file
- Understanding risk ratings and scoring
- Eliminating unnecessary data to reduce output volume
- Validating findings
- Generating Nessus reports
Detailed Review of Plugins:
- Data discovery plugins
- System-specific plugins
- Compliance plugins
Requirements
Basic knowledge of common protocols such as HTTP, HTTPS, SSH, SSL, Telnet, and SFTP.
Foundational understanding of the OSI layers.
Basic knowledge of IP addressing.
Need help picking the right course?
uzbekistan@nobleprog.com or +919818060888
Nessus Manager Training Course - Enquiry
Nessus Manager - Consultancy Enquiry
Testimonials (2)
I generally was benefit from the whole training.
Tassos Papadopoulos
Course - Nessus Manager
The course build up the whole picture and helped me understand in depth how to deal with everyday tasks I perform with Tenable Census Manager.
Konstantinos Papadopoulos
Course - Nessus Manager
Related Courses
Akraino
14 HoursThis instructor-led, live training in Uzbekistan (online or onsite) is designed for developers who wish to download, install, and configure Akraino Edge Stack blueprints to manage their edge systems.
By the end of this training, participants will be capable of installing, deploying, managing, and supporting end-to-end Akraino Edge Stack solutions to enhance and organize their edge systems, services, and devices.
Certified Kubernetes Administrator (CKA) - exam preparation
21 HoursThe Certified Kubernetes Administrator (CKA) program was established by The Linux Foundation in collaboration with the Cloud Native Computing Foundation (CNCF).
Kubernetes has become the leading platform for container orchestration.
NobleProg has been providing Docker and Kubernetes training since 2015. With over 360 successfully completed training projects, we have become one of the most recognized training providers globally in the field of containerization.
Since 2019, we have also been assisting our customers in validating their performance in Kubernetes environments by preparing them to take and pass the CKA and CKAD exams.
This instructor-led live training (available online or onsite) is designed for System Administrators and Kubernetes users who wish to validate their knowledge by passing the CKA exam.
Additionally, the training focuses on gaining practical experience in Kubernetes Administration. Therefore, we recommend participating even if you do not intend to take the CKA exam.
Course Format
- Interactive lectures and discussions.
- Extensive exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request customized training for this course, please contact us to arrange.
- To learn more about CKA certification, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-administrator-cka
Certified Kubernetes Application Developer (CKAD) - exam preparation
21 HoursThe Certified Kubernetes Application Developer (CKAD) program has been developed by The Linux Foundation and the Cloud Native Computing Foundation (CNCF), the host of Kubernetes.
This instructor-led, live training (online or onsite) is aimed at Developers who wish to confirm their skills in design, build, configure, and expose cloud native applications for Kubernetes.
On the other hand, the training also focuses on gaining practical experience in Kubernetes application development, so we recommend participating even if you do not intend to take the CKAD exam.
NobleProg has been delivering Docker & Kubernetes training since 2015. With more than 360 successfully completed training projects, we have become one of the best-known training companies worldwide in the field of containerization. Since 2019, we have also been helping our customers validate their performance in k8s environments by preparing them and encouraging them to pass CKA and CKAD exams.
Course Format
- Interactive lectures and discussions.
- Abundant exercises and practice opportunities.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized version of this course, please contact us to arrange.
- To learn more about CKAD, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-application-developer-ckad/
CompTIA Network+ N10-008 exam prep with Exam (accredited training course with exam)
35 HoursThis course covers the primary networking technologies and systems used in modern networks, teaching you how to configure, manage, and troubleshoot them effectively.
- By the end of this course, you will be able to:
- Explain the OSI and TCP/IP Models.
- Describe the characteristics of network traffic.
- Install and configure switched networks.
- Configure IP networks.
- Install and configure routed networks.
- Configure and monitor network ports and protocols.
- Discuss network application and storage challenges.
- Monitor and troubleshoot network issues.
- Explain network attacks and mitigation strategies.
- Install and configure security devices.
- Explain authentication and access control mechanisms.
- Deploy and troubleshoot cabling solutions.
- Implement and troubleshoot wireless technologies.
- Compare and contrast Wide Area Network (WAN) technologies.
- Utilize remote access methods.
- Identify site-specific policies and best practices.
Jitsi Meet: Self-Hosted Video Conferencing Replacing Zoom and Microsoft Teams
14 HoursJitsi Meet is a completely encrypted, fully open-source video conferencing platform that allows you to host it on your own servers. It offers HD video capabilities, screen sharing, collaborative editing, and live streaming features without requiring user accounts or exposing meeting data to third-party services.
This instructor-led training session (available online or in-person) is designed for intermediate DevOps engineers and system administrators who want to deploy Jitsi Meet as an alternative to Zoom, Microsoft Teams, and Google Meet.
Upon completion of this training, participants will be able to:
- Install and configure Jitsi Meet using either Docker or Debian packages.
- Optimize performance by configuring Prosody, Jicofo, and Jitsi Videobridge.
- Configure TURN servers to ensure NAT traversal and firewall compatibility.
- Enhance meeting security with passwords, lobby rooms, and end-to-end encryption.
- Integrate Jitsi with LDAP, SSO, and calendar systems.
Course Format
- Interactive lectures and discussions.
- Numerous exercises and practical practice.
- Hands-on implementation within a live-lab environment.
Customization Options
- To arrange customized training for this course, please contact us.
LEDE: Set Up a Linux Wireless Router
7 HoursThe LEDE Project (Linux Embedded Development Environment) is a Linux operating system derived from OpenWrt. It serves as a comprehensive alternative to the manufacturer-provided firmware for various wireless routers and non-network devices.
In this instructor-led, live training, participants will learn how to configure a wireless router running LEDE.
Target Audience
- Network administrators and technicians
Course Format
- A mix of lectures, discussions, exercises, and extensive hands-on practice
Matrix + Element: Decentralized Enterprise Chat to Replace Slack and Teams
14 HoursMatrix is an open protocol designed for secure, decentralized, real-time communication. Organizations are increasingly adopting Matrix, paired with the Element client, as a viable alternative to Slack and Microsoft Teams. This approach allows businesses to maintain end-to-end encryption, ensure data residency on-premise, and enable federation with external trusted partners.
Network Monitoring Without Vendor Lock-in: LibreNMS and Zabbix
28 HoursThis instructor-led, live training in Uzbekistan (online or onsite) is aimed at network and system administrators who wish to implement enterprise-grade network monitoring using open-source tools without vendor dependencies.
By the end of this training, participants will be able to deploy LibreNMS and Zabbix, monitor network devices, create dashboards and alerts, implement distributed monitoring, and integrate with external systems.
Network Security Administrator
35 HoursTarget Audience:
This course is designed for system and network administrators, as well as any professionals interested in defensive network security technologies.
ONAP for Network Orchestration and Automation
28 HoursIn this instructor-led, live training session in Uzbekistan (online or on-site), participants will learn how to utilize ONAP for automating network services.
By the end of this training, participants will be able to:
- Understand, install, and configure the various components within the ONAP ecosystem.
- Execute real-time, policy-driven orchestration and automation of physical and virtual network functions.
- Design, create, orchestrate, and monitor VNFs, SDNs, and other network services.
- Efficiently manage the entire networking lifecycle using a software-driven methodology.
- Develop, deploy, and scale networks by applying the latest open-source technologies and best practices.
OpenUEM Advanced: Automation, Security & Compliance
14 HoursOpenUEM is an open-source endpoint management platform that enables advanced automation, endpoint hardening, and compliance reporting to secure and streamline enterprise operations.
This instructor-led, live training (online or onsite) is aimed at advanced-level IT and security professionals who wish to leverage OpenUEM for automation, security hardening, compliance management, and integration with enterprise monitoring tools.
By the end of this training, participants will be able to:
- Automate endpoint management tasks including software deployment, updates, and reporting.
- Apply security hardening policies and ensure endpoint compliance.
- Integrate OpenUEM with enterprise security and monitoring tools for centralized visibility.
- Generate compliance reports and enforce regulatory or organizational standards.
Format of the Course
- Interactive lecture and discussion.
- Hands-on exercises and practice scenarios.
- Implementation in a lab environment with real endpoints.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
OpenUEM Fundamentals: Endpoint Management Essentials
14 HoursOpenUEM is an open-source unified endpoint management platform that enables organizations to deploy, configure, and maintain endpoint devices efficiently.
This instructor-led, live training (online or onsite) is aimed at beginner-level IT professionals who wish to gain foundational skills in managing endpoints using OpenUEM, including installation, configuration, and basic device management.
By the end of this training, participants will be able to:
- Install and configure OpenUEM server and agents across multiple endpoint platforms.
- Enroll, organize, and manage endpoints efficiently within the OpenUEM console.
- Deploy software, patches, and updates to managed devices.
- Monitor device health, generate reports, and perform basic troubleshooting tasks.
Format of the Course
- Interactive lecture and discussion.
- Hands-on exercises and practice scenarios.
- Implementation in a lab environment with real endpoints.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
OpenUEM Intermediate: Agent Deployment, Inventory & Policy Management
14 HoursOpenUEM is an open-source endpoint management platform that enables organisations to efficiently deploy agents, maintain accurate device inventories, and enforce endpoint policies.
This instructor-led, live training (available online or on-site) is designed for intermediate-level IT professionals seeking to develop practical skills in deploying agents, managing inventories, and implementing policies across endpoint devices using OpenUEM.
By the end of this training, participants will be able to:
- Efficiently deploy OpenUEM agents across multiple endpoint platforms.
- Maintain and manage accurate asset inventories for all managed devices.
- Create, assign, and enforce policies to ensure compliance and security.
- Distribute software, updates, and patches to endpoints effectively.
Course Format
- Interactive lectures and discussions.
- Hands-on exercises and practice scenarios.
- Implementation in a lab environment with real endpoints.
Course Customisation Options
- To request a customised training session for this course, please contact us to arrange.
OpenStack and NFV (with OVN and OpenFlow)
21 HoursThis course provides comprehensive training on OpenStack networking. It begins with an introduction to OpenStack and its architecture, then details the core OpenStack projects: Identity service (Keystone), Image service (Glance), Compute service (Nova), and Block storage (Cinder). This foundation helps describe the network environment within OpenStack, with a primary focus on the Networking project (Neutron). The course explains virtual network infrastructure, leveraging the Open Virtual Network project, Open vSwitch, and OpenFlow. The main objective is to help participants understand OpenStack's basic operations and architecture, while familiarizing them with the diverse networking technologies powering OpenStack. It further expands on OVN, including its underlying flows, resources, and tools.
Customization options
The training can be condensed into a 2-day session focusing on core aspects most relevant to the customer. Alternatively, it can be extended to cover administrative, design, networking, and/or troubleshooting topics related to OpenStack deployments. Other underlying SDN solutions, such as Linux Bridge or OvS, can also be included.
Software-Defined Wide Area Network (SD-WAN) Management and Operation
7 HoursThis instructor-led, live training in Uzbekistan (online or onsite) is designed for intermediate-level network professionals who wish to effectively manage and operate SD-WAN networks, including design, configuration, troubleshooting, and optimization.
By the end of this training, participants will be able to:
- Understand the fundamental concepts, benefits, and challenges associated with SD-WAN technologies.
- Design an SD-WAN architecture tailored to organizational needs and deploy SD-WAN solutions effectively.
- Implement and manage security features within an SD-WAN.
- Monitor, manage, and troubleshoot SD-WAN environments.