OpenVas Basic to Advanced For Ethical Hacking Pentesting

Learn OpenVas GVM from scratch, in Kali Linux, and OpenVas in Cloud, setup advanced scans, alerts, reports.
OpenVas Basic to Advanced For Ethical Hacking Pentesting
File Size :
4.38 GB
Total length :
8h 16m

Category

Instructor

Feliciano Mangueleze

Language

Last update

12/2022

Ratings

4.1/5

OpenVas Basic to Advanced For Ethical Hacking Pentesting

What you’ll learn

How To Setup OpenVas (GVM) in Kali Linux
OpenVas in Cloud With Greenbone Cloud Services
How To Setup Greenbone Operating Systems (GOS)
How To Perform System Audits
Vulnerability Management Process
How To Generate reports and apply notes and overrides
How To Work With Advanced user management
How To Create and assign Tickets to users
How To Setup Alerts via email and SMB
How To Create Business Process Map
How To Create policies
How To Perform compliance policies
How To Configure advanced filters
Understand SCAP concepts
Social Engeering Red Flags
CIS controls v8 to secure systems
Prioritize Vulnerabilities
SCAP Concepts
How To Update Feeds
How To Setup External Access To OpenVas
How To Fix Issues

OpenVas Basic to Advanced For Ethical Hacking Pentesting

Requirements

Basic knowledge of computers and Linux will be an advantage but is not a requirement of the course

Description

With the growing number of cyber attacks, system invasions, data theft, malware attacks such as Ransomware among others, vulnerability management to prevent invasions and ensure information security has become an indispensable task for IT professionals and organizations in general. In addition to implementing security mechanisms to protect oneself, it is necessary to know the vulnerabilities and deal with them. The issue of vulnerability management is so serious that even in the phase of a penetration test or cyber attack, the phase that precedes the invasion, is the discovery of vulnerabilities, i.e. when an attacker wants to attack a system, he will need to know the vulnerabilities and after knowing them, exploit them. Therefore, in this course you will have the opportunity to learn how to find the vulnerabilities in systems, find solutions, and elaborate a mitigation plan for them and implement countermeasures with the best practices guide according to the Center for Internet Security (CIS Control Set), an entity that works to support organizations to implement best practices for asset management and data backup. It is important to know how vulnerability scanners work for better positioning when it comes to decision making after analysis. After completing this course, you will be able to implement and manage OpenVas as well as assign tickets to the different people responsible for each department where vulnerabilities are detected as well as to IT professionals.

Overview

Section 1: Introduction

Lecture 1 Introduction

Section 2: Greenbone Vulnerability Manager Arquitecture

Lecture 2 GVM Architecture

Lecture 3 Greenbone Community Edition Architecture – Updated

Lecture 4 2. Vulnerability Management & Life Cycle

Section 3: Preparing the LAB

Lecture 5 1. Download Virtual Machines

Lecture 6 2. Import Virtual Machines

Lecture 7 3. Start Kali Linux & Metasploitable

Section 4: Setup OpenVas

Lecture 8 Setup OpenVas

Lecture 9 2. Change & Reset Password

Lecture 10 3. Help & Manual

Lecture 11 3.1. Help & Updates – Updated

Lecture 12 4. Community & Commercial Versions

Lecture 13 5. FAQ & Community Forum Part 1

Lecture 14 5.1. FAQ & Community Forum Part 2

Lecture 15 5.2. FAQ & Community Forum Part 3 – Updated

Lecture 16 6. CVSS Calculator

Lecture 17 7. Feed Update

Lecture 18 8. Read Before Use – Legal Concerns

Section 5: SecInfo

Lecture 19 1. SCAP & NVD

Lecture 20 2. SecInfo – NVTs

Lecture 21 3. SecInfo – CPEs

Lecture 22 4. SecInfo – CVEs

Lecture 23 4.1. SecInfo – CVEs

Lecture 24 5. SecInfo – OVAL Definitions

Lecture 25 5.1. SecInfo – OVAL Definitions – Updated

Lecture 26 6. CERT-BUND & DFN-CERT Advisories

Section 6: Advanced Scan Configurations

Lecture 27 1. Basic Linux Commands

Lecture 28 2. Task Wizard

Lecture 29 2.1. Advanced Task Wizard

Lecture 30 2.2. Advanced Task Wizard with Log4shell – Updated

Lecture 31 2.1.3. Authenticated Checks

Lecture 32 2.1.4. Modify Task

Lecture 33 3. Hosts

Lecture 34 3.1. Hosts Type of IPs

Lecture 35 3.2. IANA & IPv6

Lecture 36 4. Alive Test

Lecture 37 5. Reverse Lookup

Lecture 38 6. Alerts Part 1

Lecture 39 6.1. Alerts Part 2

Lecture 40 7. Test Alert to SMB

Lecture 41 8. Schedule

Lecture 42 9. Scanner

Lecture 43 10. Alterable Task

Lecture 44 11. Container Task

Lecture 45 12. Task Overview

Lecture 46 13. Nmap

Lecture 47 13.1. Nmap & Wireshark

Section 7: Configurations

Lecture 48 1. Create Target

Lecture 49 2. Create Port List

Lecture 50 3. Create Credentials

Lecture 51 4. Scan Configs

Lecture 52 5. Setup Postfix Mail Server

Lecture 53 5.1. Test Alert to Email

Lecture 54 5.2. Alert issues

Lecture 55 6. Schedules

Lecture 56 7. Report Formats

Lecture 57 8. Scanners

Lecture 58 9. Filters Part 1

Lecture 59 10. Filters Part 2

Lecture 60 11. Filters Part 3

Lecture 61 12. Tags

Lecture 62 13. External Acess to GSA in LAN

Section 8: Administration

Lecture 63 1. User

Lecture 64 2. Groups

Lecture 65 3. Roles

Lecture 66 4. Permissions

Lecture 67 5. Performance

Lecture 68 6. Trashcan

Section 9: Vulnerability Management

Lecture 69 1. Reports Part 1

Lecture 70 1.1. Reports Part 2

Lecture 71 1.2. Reports Part 3

Lecture 72 1.3. Reports Part 4

Lecture 73 2. Hosts, OS e TLS

Lecture 74 3. Results & Vulnerabilities

Lecture 75 4. Notes

Lecture 76 5. Overrides

Lecture 77 6. Filtered Reports

Lecture 78 7. Delta Report

Section 10: Resillience

Lecture 79 1. Tickets Part 1

Lecture 80 2. Create Policies

Lecture 81 2.1. Import Policies

Lecture 82 3. Create Audits

Lecture 83 4. Business Process Map Part 1

Lecture 84 4.1. Business Process Map Part 2

Lecture 85 4.2. Business Process Maps Part 3 – Updated

Lecture 86 5. Vulnerabilities Trend

Section 11: Dashboards & GOS

Lecture 87 1. Dashboards

Lecture 88 2. GOS Part 1

Lecture 89 3. GOS Part 2

Lecture 90 4. My Settings Part 1

Lecture 91 5. My Settings Part 2

Section 12: Security Measures

Lecture 92 1. Prioritize Vulnerabilities

Lecture 93 2. Social Engineering Red Flags

Lecture 94 2.1. Temporary Emails

Lecture 95 3. Knowbe4 Training

Lecture 96 4. CIS Controls v8

Section 13: What Comes Next?

Lecture 97 What Comes Next?

Section 14: Greenbone Cloud Services

Lecture 98 Register to Greenbone Sustainable Resilience

Lecture 99 Register to Bluebone Cyber Security

Lecture 100 Change & Reset Password

Lecture 101 Help & Manual

Lecture 102 Import Gateway In VirtualBox

Lecture 103 Setup Gateway

Lecture 104 Create Task

Lecture 105 Scan Management

Lecture 106 Report Overview

Lecture 107 Understanding External Target

Lecture 108 Create External Target

Lecture 109 Scan External Target

Lecture 110 Scan Configurations

Lecture 111 Alive Test & Port List

Lecture 112 Create Credential

Lecture 113 Create Schedule

Lecture 114 Teams For Collaboration

Lecture 115 Setup Notifications

Lecture 116 Upgrade Your Free Subscription

Section 15: Gaining Access – Server Side Attacks

Lecture 117 Introduction to the section

Lecture 118 Gaining access to Metasploitable Machine via ssh

Lecture 119 Changing the SSH default password

Lecture 120 Gaining access to Metasploitable Machine via FTP

Lecture 121 Introduction to Metasploit-Freamwork

Lecture 122 Modules in Metasploit

Lecture 123 Gaining acess to Metasploitable Machine with Metasploit

Lecture 124 Brute Forcing SSH with Metasploit

Lecture 125 Exploiting vsftpd service with Metasploit

Lecture 126 Managing Sessions and using Meterpreter

Lecture 127 Finding wordlists in Kali Linux

Lecture 128 Creating a wordlist with Crunch

Network Administrators,Information Technology professionals and students,Curious and everyone who cares about information security,Information security enthusiasts who want to learn how to manage vulnerabilities

Course Information:

Udemy | English | 8h 16m | 4.38 GB
Created by: Feliciano Mangueleze

You Can See More Courses in the IT & Software >> Greetings from CourseDown.com

New Courses

Scroll to Top