دانلود کتاب آموزش نرم افزار Nessus برای تست نفوذ در شبکه ها

دانلود کتاب آموزش نرم افزار Nessus برای تست نفوذ در شبکه ها

Nessus یکی از نرم افزارهای مطرح برای تست نفوذپذیری در شبکه هاست مانند نرم افزار acunetix . در این پست کتابی برای نصب و راه اندازی این نرم افزار برای شما عزیزان آماده کرده ایم . در حال حاظر برخی از شرکت ها و سازمان ها برای تست امنیت شبکه خود از این نرم افزار استفاد می کنند .

توضیحات کتاب :

Master how to perform IT infrastructure security vulnerability assessments using Nessus with tips and insights from real-world challenges faced during vulnerability assessment

سرفصل های کتاب : همان طور که مشاهده می کنید سرفصل های کتاب بسیار کاربردی و دارای مثال هایی در مورد هنر exploit نویسی می باشد

 

Chapter 1: Fundamentals
Vulnerability Assessment and Penetration Testing
Need for Vulnerability Assessment
Risk prevention
Compliance requirements
The life cycles of Vulnerability Assessment and Penetration Testing
Stage 1 – scoping
Stage 2 – information gathering
Stage 3 – vulnerability scanning
Stage 4 – false positive analysis
Stage 5 – vulnerability exploitation
(Penetration Testing)
Stage 6 – report generation
Introduction to Nessus
Initial Nessus setup
Scheduling scans
The Nessus plugin
Patch management using Nessus
Governance, risk, and compliance checks using Nessus
Installing Nessus on different platforms
Prerequisites
Installing Nessus on Windows 7
Installing Nessus on Linux
Definition update
Online plugin updates
Offline plugin updates
Custom plugins feed host-based updates
User management
Adding a new user
Deleting an existing user
Changing the password or role of an existing user
Nessus system configuration
General Settings
SMTP settings
Web proxy settings
Feed Settings
Mobile Settings
ActiveSync (Exchange)
Apple Profile Manager
Good For Enterprise
Result Settings
Advanced Settings


Chapter 2: Scanning
Scan prerequisites
Scan-based target system admin credentials
Direct connectivity without a firewall
Scanning window to be agreed upon
Scanning approvals and related paper work
Backup of all systems including data and configuration
Updating Nessus plugins
Creating a scan policy as per target system OS and information
Configuring a scan policy to check for an organization's security policy compliance
Gathering information of target systems
Sufficient network bandwidth to run the scan
Target system support staff
Policy configuration
Default policy settings
New policy creation
General Settings
Credentialed scan
Plugins
Preferences
Scan configuration
Configuring a new scan
General settings
E-mail settings
Scan execution and results


Chapter 3: Scan Analysis
Result analysis
Report interpretation
Hosts Summary (Executive)
Vulnerabilities By Host
Vulnerabilities By Plugin
False positive analysis
Understanding an organizations' environment
Target-critical vulnerabilities
Proof of concept
Port scanning tools
Effort estimation
Vulnerability analysis
False positives
Risk severity
Applicability analysis
Fix recommendations
Vulnerability exploiting
Exploit example 1
Exploit example 2
Exploit example 3


Chapter 4: Reporting Options
Vulnerability Assessment report
Nessus report generation
Report filtering option
Nessus report content
Report customization
Report automation


Chapter 5: Compliance Checks
Audit policies
Compliance reporting
Auditing infrastructure
Windows compliance check
Windows File Content
Unix compliance check
Cisco IOS compliance checks
Database compliance checks
PCI DSS compliance
VMware vCenter/vSphere Compliance Check

Download Link کتاب آموزش تست نفوذ با نرم افزار Nessus

حجم : 2.52 مگ

زبان : انگلیسی

تعداد صفحات : 116

سطح : حرفه ایی

ارسال نظر

ارسال نظر

عکس خوانده نمی شود