Nessus Manager Training Course
The Nessus vulnerability scanner is a highly versatile platform designed for detecting and managing security vulnerabilities. Beyond basic vulnerability detection, it also supports baseline auditing, where your system configuration is evaluated against established hardening standards.
During this instructor-led course, we will introduce the solution's core components and various functionalities. Each module within the application will be explained in detail, along with its practical use cases.
By the end of the course, participants will be capable of performing both authenticated and unauthenticated vulnerability scans on nearly all IP-based systems. You will learn to analyze scan results to eliminate false positives, prioritize findings based on risk, and recommend appropriate compensating controls. This training will empower you to assess your systems' security posture using Nessus and determine the most effective remediation strategies.
Audience:
- Infrastructure managers
- System administrators
- System auditors
- Compliance officers
- Vulnerability managers
- Cybersecurity managers
Format:
A blend of lectures, discussions, and hands-on practice
This course is available as onsite live training in Mexico or online live training.Course Outline
Overview of the Nessus Interface and Navigation
- Installing the Nessus Server and configuring the license
- Checking and updating plugins
- Conducting scans on Windows systems
- Utilizing preloaded scan profiles
- Reviewing preinstalled configuration standards
- Navigating the interface
- Setting up notifications
Scanning:
- Executing simple scans
- Running scans from predefined templates
- Creating custom templates from preloaded plugins
- Performing asset discovery scans
Understanding Nessus Output:
- Analyzing the Nessus output file
- Interpreting risk ratings and scoring
- Filtering out irrelevant data to reduce output volume
- Validating findings
- Generating Nessus reports
Detailed Review of Plugins:
- Data discovery plugins
- System-specific plugins
- Compliance plugins
Requirements
Basic knowledge of common protocols such as HTTP, HTTPS, SSH, SSL, Telnet, and SFTP
Familiarity with the OSI model layers
Understanding of IP addressing
Open Training Courses require 5+ participants.
Nessus Manager Training Course - Booking
Nessus Manager Training Course - Enquiry
Nessus Manager - Consultancy Enquiry
Testimonials (2)
I generally was benefit from the whole training.
Tassos Papadopoulos
Course - Nessus Manager
The course build up the whole picture and helped me understand in depth how to deal with everyday tasks I perform with Tenable Census Manager.
Konstantinos Papadopoulos
Course - Nessus Manager
Upcoming Courses
Related Courses
Akraino
14 HoursThis instructor-led, live training in Mexico (online or onsite) is aimed at programmers who wish to download, install, and set up Akraino Edge Stack blueprints to manage their edge systems.
By the end of this training, participants will be able to install, deploy, manage, and support end-to-end Akraino Edge Stack solutions to improve and organize their edge systems, services, and devices.
Certified Kubernetes Administrator (CKA) - exam preparation
21 HoursThe Certified Kubernetes Administrator (CKA) program was established by The Linux Foundation and the Cloud Native Computing Foundation (CNCF).
Kubernetes has emerged as the leading platform for container orchestration.
Since 2015, NobleProg has specialized in delivering Docker and Kubernetes training. With over 360 successful training projects completed, we have established ourselves as one of the most recognized training providers globally in the field of containerization.
Since 2019, we have also been assisting our clients in validating their Kubernetes skills by preparing them for and encouraging the pursuit of the CKA and CKAD exams.
This instructor-led live training (available online or onsite) is designed for System Administrators and Kubernetes users who wish to validate their expertise by passing the CKA exam.
Furthermore, the training emphasizes gaining practical experience in Kubernetes Administration. Therefore, we highly recommend participating, even if you do not plan to take the CKA exam.
Course Format
- Interactive lectures and discussions.
- Extensive exercises and practice sessions.
- Hands-on implementation within a live-lab environment.
Course Customization Options
- To request customized training for this course, please contact us to arrange details.
- To learn more about CKA certification, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-administrator-cka
Certified Kubernetes Application Developer (CKAD) - exam preparation
21 HoursThe Certified Kubernetes Application Developer (CKAD) program was created by The Linux Foundation and the Cloud Native Computing Foundation (CNCF), the organization behind Kubernetes.
This instructor-led live training (available online or in-person) is designed for Developers who want to validate their abilities in designing, building, configuring, and exposing cloud-native applications on Kubernetes.
Additionally, the training emphasizes gaining hands-on experience in Kubernetes application development; therefore, we encourage participation even if you do not plan to take the CKAD exam.
NobleProg has been providing Docker and Kubernetes training since 2015. With over 360 successfully completed training projects, we have become one of the most recognized training providers globally in the field of containerization. Since 2019, we have also been helping our customers validate their performance in Kubernetes environments by preparing them to pass the CKA and CKAD exams.
Course Format
- Interactive lectures and discussions.
- Abundant exercises and practice sessions.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request customized training for this course, please contact us to make arrangements.
- To learn more about CKAD, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-application-developer-ckad/
Jitsi Meet: Self-Hosted Video Conferencing Replacing Zoom and Microsoft Teams
14 HoursJitsi Meet is a fully encrypted, 100% open-source video conferencing solution that you can host on your own servers. It supports HD video, screen sharing, collaborative editing, and live streaming without requiring accounts or exposing meeting data to third-party platforms.
This instructor-led, live training (online or onsite) is aimed at intermediate DevOps and system administrators who wish to deploy Jitsi Meet as a replacement for Zoom, Microsoft Teams, and Google Meet.
By the end of this training, participants will be able to:
- Install and configure Jitsi Meet using Docker or Debian packages.
- Configure Prosody, Jicofo, and Jitsi Videobridge for optimal performance.
- Set up TURN servers for NAT traversal and firewall compatibility.
- Secure meetings with passwords, lobby rooms, and end-to-end encryption.
- Integrate Jitsi with LDAP, SSO, and calendar systems.
Course Format
- Interactive lecture and discussion.
- Plenty of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
LEDE: Set Up a Linux Wireless Router
7 HoursThe LEDE Project (Linux Embedded Development Environment) is a Linux-based operating system derived from OpenWrt. It serves as a comprehensive alternative to the vendor-provided firmware for a wide variety of wireless routers and non-networking devices.
Through this instructor-led live training, participants will learn how to configure and set up a wireless router running LEDE.
Audience
- Network administrators and technicians
Course Format
- A blend of lectures, discussions, exercises, and extensive hands-on practice
Matrix + Element: Decentralized Enterprise Chat to Replace Slack and Teams
14 HoursMatrix is an open protocol designed for secure, decentralized, real-time communication. Organizations are increasingly adopting Matrix, paired with the Element client, as a viable alternative to Slack and Microsoft Teams. This approach allows them to maintain end-to-end encryption, ensure on-premise data residency, and enable federation with external trusted partners.
Network Monitoring Without Vendor Lock-in: LibreNMS and Zabbix
28 HoursThis instructor-led, live training in Mexico (online or in-person) targets network and system administrators who wish to implement enterprise-grade network monitoring using open-source tools without vendor dependencies.
By the end of this training, participants will be able to deploy LibreNMS and Zabbix, monitor network devices, create dashboards and alerts, implement distributed monitoring, and integrate with external systems.
Network Security Administrator
35 HoursTarget Audience:
This course is designed for system administrators, network administrators, and any professionals interested in defensive network security technologies.
ONAP for Network Orchestration and Automation
28 HoursIn this instructor-led, live training in Mexico (online or onsite), participants will learn how to use ONAP to automate networking services.
By the end of this training, participants will be able to:
- Understand, install and configure the various components in the ONAP ecosystem.
- Carry out real-time, policy-driven orchestration and automation of physical and virtual network functions.
- Design, create, orchestrate, and monitor VNFs, SDNs and other network services.
- Efficiently manage the entire networking lifecycle using a software-driven approach.
- Develop, deploy, and scale a network using the latest open source technologies and practices.
OpenUEM Advanced: Automation, Security & Compliance
14 HoursOpenUEM is an open-source endpoint management platform that enables advanced automation, endpoint hardening, and compliance reporting to secure and streamline enterprise operations.
This instructor-led, live training (online or onsite) is aimed at advanced-level IT and security professionals who wish to leverage OpenUEM for automation, security hardening, compliance management, and integration with enterprise monitoring tools.
By the end of this training, participants will be able to:
- Automate endpoint management tasks including software deployment, updates, and reporting.
- Apply security hardening policies and ensure endpoint compliance.
- Integrate OpenUEM with enterprise security and monitoring tools for centralized visibility.
- Generate compliance reports and enforce regulatory or organizational standards.
Format of the Course
- Interactive lecture and discussion.
- Hands-on exercises and practice scenarios.
- Implementation in a lab environment with real endpoints.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
OpenUEM Fundamentals: Endpoint Management Essentials
14 HoursOpenUEM is an open-source unified endpoint management solution that empowers organizations to efficiently deploy, configure, and maintain endpoint devices.
This live training, led by an instructor and available online or in-person, is designed for beginner-level IT professionals looking to build foundational skills in endpoint management using OpenUEM. The course covers installation, configuration, and fundamental device management tasks.
Upon completion of this training, participants will be able to:
- Install and configure the OpenUEM server and agents across various endpoint platforms.
- Enroll, organize, and manage endpoints effectively using the OpenUEM console.
- Deploy software, patches, and updates to managed devices.
- Monitor device health, generate reports, and perform basic troubleshooting tasks.
Course Format
- Interactive lectures and discussions.
- Hands-on exercises and practical scenarios.
- Implementation in a lab environment with real endpoints.
Customization Options
- To request customized training for this course, please contact us to make arrangements.
OpenUEM Intermediate: Agent Deployment, Inventory & Policy Management
14 HoursOpenUEM is an open-source endpoint management platform that empowers organizations to efficiently deploy agents, maintain precise device inventories, and enforce endpoint policies.
This instructor-led live training (available online or onsite) is designed for IT professionals with an intermediate skill level who want to develop practical expertise in deploying agents, managing inventories, and implementing policies across endpoint devices using OpenUEM.
Upon completing this training, participants will be capable of:
- Efficiently deploying OpenUEM agents across various endpoint platforms.
- Maintaining and managing accurate asset inventories for all managed devices.
- Creating, assigning, and enforcing policies to ensure compliance and security.
- Effectively distributing software, updates, and patches to endpoints.
Course Format
- Interactive lectures and discussions.
- Hands-on exercises and practice scenarios.
- Implementation in a lab environment with real endpoints.
Course Customization Options
- To request customized training for this course, please contact us to arrange.
OpenStack and NFV (with OVN and OpenFlow)
21 HoursThis course offers comprehensive training on OpenStack networking. It begins with an introduction to OpenStack and its architecture, clarifying core projects such as the Identity service (Keystone), Image service (Glance), Compute service (Nova), and Block storage (Cinder). This foundation helps describe the context of networks within OpenStack, with a primary focus on the Networking project (Neutron). The course details the virtual network infrastructure, leveraging the Open Virtual Network framework, Open vSwitch, and OpenFlow. The objective is to equip participants with a clear understanding of OpenStack’s basic operations and architecture, while familiarizing them with the diverse networking technologies that underpin OpenStack, including detailed insights into OVN, its flows, resources, and tools.
Customization options
The training can be condensed into a 2-day session focusing on core aspects relevant to the customer. It can also be expanded to cover administrative, design, networking, and/or troubleshooting topics specific to OpenStack deployments. Additionally, other underlying SDN solutions such as Linux Bridge or OvS can be discussed.
Software-Defined Wide Area Network (SD-WAN) Management and Operation
7 HoursThis instructor-led, live training in Mexico (online or onsite) is designed for intermediate-level network professionals seeking to effectively manage and operate SD-WAN networks, including design, configuration, troubleshooting, and optimization.
Upon completing this training, participants will be able to:
- Grasp the core concepts, advantages, and challenges associated with SD-WAN technologies.
- Design an SD-WAN architecture that aligns with organizational requirements and successfully deploy SD-WAN solutions.
- Implement and oversee security features within an SD-WAN environment.
- Monitor, manage, and troubleshoot SD-WAN environments.
Synapse and Element: Self-Hosted Chat Replacing Slack and Microsoft Teams
14 HoursSynapse is the reference homeserver implementation for the Matrix protocol, enabling decentralized, end-to-end encrypted messaging. This instructor-led, live training (online or on-site) is designed for intermediate DevOps engineers and system administrators who wish to use Synapse and Element to replace cloud chat platforms with a self-hosted, federated messaging infrastructure.