Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/hamsycodes/vulnerabilitymanagement-using-nessus-essentials-
A guide for accessing vulnerabilities. You will access vulnerabilities using a Windows 10 VM, set up Nessus Essentials on your system, run multiple scans carrying out various tasks including (installing old software versions, tweaking system settings and setting up credentials), compare the scans, remediate them by performing the tasks mentioned.
https://github.com/hamsycodes/vulnerabilitymanagement-using-nessus-essentials-
cybersecurity nessus-scanner security vulnerability-management vulnerability-scanners
Last synced: 2 days ago
JSON representation
A guide for accessing vulnerabilities. You will access vulnerabilities using a Windows 10 VM, set up Nessus Essentials on your system, run multiple scans carrying out various tasks including (installing old software versions, tweaking system settings and setting up credentials), compare the scans, remediate them by performing the tasks mentioned.
- Host: GitHub
- URL: https://github.com/hamsycodes/vulnerabilitymanagement-using-nessus-essentials-
- Owner: hamsycodes
- Created: 2024-11-26T19:08:11.000Z (27 days ago)
- Default Branch: main
- Last Pushed: 2024-12-08T18:08:34.000Z (15 days ago)
- Last Synced: 2024-12-08T19:22:20.823Z (15 days ago)
- Topics: cybersecurity, nessus-scanner, security, vulnerability-management, vulnerability-scanners
- Homepage: https://medium.com/@hamsnoesnothin/vulnerability-management-using-nessus-essentials-60a49ca72865
- Size: 5.86 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# VulnerabilityManagement-using-Nessus-Essentials-
A guide for accessing vulnerabilities. You will access vulnerabilities using a Windows 10 VM, set up Nessus Essentials on your system, run multiple scans carrying out various tasks including (installing old software versions, tweaking system settings and setting up credentials), compare the scans, remediate them by performing the tasks mentioned.Below I have pasted the link for the entire blogpost.