Call +65 6100 0613 Email: enquiry@tertiaryinfotech.com

Enhance Your Employability with Certified Skills and Courses in Singapore - WSQ , IBF-STS, Skills Certification

Vulnerability Management with Nessus

It only takes one misconfigured device or missing patch for hackers to infiltrate your network. Fix the flaws in your systems before attackers can find them with Nessus, the network vulnerability scanner popular among cybersecurity analysts, sys admins, and network engineers. Using Nessus, you can scan servers, endpoints, and other network devices and check them against a database of thousands of known vulnerabilities

This course will teach you how to setup Nessus for vulnerabilities management.

Certificate

All participants will receive a Certificate of Completion from Tertiary Courses after achieved at least 75% attendance.

Funding and Grant Applications

No funding is available for this course

Course Code: C614

Course Booking

The course fee listed below is before subsidy/grant, if applicable. We will apply for the grant and send you the invoice with nett fee.

$300.00 (GST-exclusive)
$327.00 (GST-inclusive)

Course Date

* Required Fields

Post-Course Support

We provide free consultation related to the subject matter after the course. Please email your queries to enquiry@tertiaryinfotech.com and we will forward your queries to the subject matter experts and get back to you asap.

Course Cancellation/Reschedule Policy

We reserve the right to cancel or re-schedule the course due to unforeseen circumstances. If the course is cancelled, we will refund 100% to participants.
Note the venue of the training is subject to changes due to class size and availability of the classroom.
Note the minimal class size to start a class is 3 Pax.


Course Details

Topic 1: Get Started on Vulnerability Management and Nessus

  • What is Vulnerability Manamgenet?
  • Download and Install Nessus
  • Explore Nessus Interface

Topic 2: Create a Vulnerability Management Program

  • Identify Scan Targets
  • Scan Frequency
  • Scan Configuration
  • Scan Perspective
  • Scanner Maintenance

Topic 3: Remediating Vulnerabilities

  • Report Scan Results
  • Priortise Remediatin
  • Create a Remediation Workflow
  • Barriers to Vulnerabilities Remediation

Topic 4: Analyzing Scan Results

  • SCAP
  • CVSS
  • Analyzing Scan Reports
  • Correlating Scan Results

Topic 5: Common Vulnerabilities

  • Server Vulnerabilites
  • Endpoint Vulnerabilities
  • Network Vulnerabilities
  • Virutalization Vulnerabilites 
  • Cross Sie Scripting
  • Preventing SQL Injecton

Course Info

Promotion Code

Your will get 10% discount voucher for 2nd course onwards if you write us a Google review.

Minimum Entry Requirement

Knowledge and Skills

  • Able to operate using computer functions
  • Minimum 3 GCE ‘O’ Levels Passes including English or WPL Level 5 (Average of Reading, Listening, Speaking & Writing Scores)

Attitude

  • Positive Learning Attitude
  • Enthusiastic Learner

Experience

  • Minimum of 1 year of working experience.

Target Age Group: 18-65 years old

Minimum Software/Hardware Requirement

Software:

TBD

Hardware: Window or Mac Laptops

Job Roles

  • Cyber Security Staff
  • Network Engineers
  • IT Administrators

Trainers

Muhammed Siraj: Muhammed Siraj is an IT executive, lecturer, trainer, security expert, developer, hardware technician, and entrepreneur with over 15 years of experience in the IT profession. He is an experienced IT instructor who has delivered several lecturers in the area of Cybersecurity, Computer Forensics, and Fraud detection to the military, police, CID, Financial Institutions, among others. In addition to training, he provides consultancy services to Educational and Governmental Institutions in the area of computer security and adoption of Open Source solutions. His experience and knowledge acquired from Ghana, Mali, Denmark, South Africa, and Malaysia, enables him to interact with people of different cultural backgrounds very well.

Customer Reviews (2)

Will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
Nil (Posted on 6/3/2018)
Will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
Maybe we can have catered lunch. (Posted on 6/3/2018)

Write Your Own Review

You're reviewing: Vulnerability Management with Nessus

How do you rate this product? *

  1 star 2 stars 3 stars 4 stars 5 stars
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
  • Reload captcha
    Attention: Captcha is case sensitive.

You May Be Interested In These Courses

Basic Cyber Security Course

Basic Cyber Security Course

152 Review(s)
$298.00 (GST-exclusive)
$324.82 (GST-inclusive)
Advanced Cyber Security Course

Advanced Cyber Security Course

48 Review(s)
$298.00 (GST-exclusive)
$324.82 (GST-inclusive)
WSQ - Cyber Security Awareness Course for Personal and Businesses

WSQ - Cyber Security Awareness Course for Personal and Businesses

109 Review(s)
$350.00 (GST-exclusive)
$381.50 (GST-inclusive)
4 Days Wireshark  Network Analysis Specialization

4 Days Wireshark Network Analysis Specialization

19 Review(s)
$1,000.00 (GST-exclusive)
$1,090.00 (GST-inclusive)
WSQ - Network Securities for Beginners

WSQ - Network Securities for Beginners

18 Review(s)
$688.00 (GST-exclusive)
$749.92 (GST-inclusive)
5 Days Cyber Security Specialization

5 Days Cyber Security Specialization

1 Review(s)
$1,500.00 (GST-exclusive)
$1,635.00 (GST-inclusive)