Performing Network Vulnerability Scanning with Nexpose

Performing Network Vulnerability Scanning with Nexpose
English | Size: 352.81 MB
Category: Tutorial

In this course, you will learn how to deploy the Nexpose tool against a variety of different targets. You will create your own custom templates and tune them to create specific policies that match the target you are assessing. [Read more…]

Scanning and Enumeration with Kali Linux | Sean-Philip Oriyano | Packt Publishing

Scanning and Enumeration with Kali Linux | Sean-Philip Oriyano | Packt Publishing
English | Size: 655.20 MB
Category: CBT

Kali Linux contains a large amount of penetration testing tools from various different niches of the security and forensics fields. The Kali Linux penetration testing platform contains a vast array of tools and utilities, from information gathering to final reporting, that enable security and IT professionals to assess the security of their systems.
[Read more…]

INE Ethical Hacking Module 3 Scanning Networks Josue Vargas

INE | Ethical Hacking: Module 3 :: Scanning Networks | Josue Vargas
English | Size: 485.86 MB
Category: CBTs

Network scanning refers to a set of intelligence gathering procedures hackers perform to identify hosts, ports, and other vulnerabilities in a network. In this course you will become prepared to handle this portion of the CEH exam.
[Read more…]

Udemy – Network and Vulnerability Scanning By Using Nmap Nessus

Udemy – Network and Vulnerability Scanning By Using Nmap Nessus
English | Size: 315.17 MB
Category: Network

Welcome to the "Network and Vulnerability Scanning by using Nmap & Nessus" course. This course is our 3rd course in our Ethical Hacking series.

I wanted to use “Hacking Essentials” in front of the name of the course, but size limit didn’t allow it.

Why “hacking essentials”?
[Read more…]

Lynda – Learning FARO: Laser Scanning

Lynda – Learning FARO: Laser Scanning
English | Size: 2.6GB
Category: Tutorial

Laser scanning is a high-precision method of reality capture. By sending laser beams toward a target area, observing the reflected beam, and performing intricate calculations, the FARO Focus laser scanner can construct a data set that represents the target in three dimensions. This course teaches you about the operation of the scanner and explains how to use the FARO scan-editing software, FARO SCENE, to turn the data set into an 3D object you can manipulate in a CAD program. Join instructor Dustin Manning as he takes you on a hands-on tour of this powerful technology. Learn how to create accurate 3D scans in indoor and outdoor scenarios, import them into SCENE, and adjust and export your project for use in other designs. [Read more…]

Packt Publishing – Scanning and Enumeration with Kali Linux

Packt Publishing – Scanning and Enumeration with Kali Linux
English | Size: 800.31 MB
Category: Tutorial

Kali Linux contains a large amount of penetration testing tools from various different niches of the security and forensics fields. The Kali Linux penetration testing platform contains a vast array of tools and utilities, from information gathering to final reporting, that enable security and IT professionals to assess the security of their systems. [Read more…]

Pluralsight – Network Vulnerability Scanning with OpenVAS

Pluralsight – Network Vulnerability Scanning with OpenVAS
English | Size: 225.20 MB
Category: CBTs

Before launching a penetration testing session, you must first assess the target network and its compute resources for known vulnerabilities. The OpenVAS suite is built to perform complete and effective vulnerability scans. Learn how it’s done.
All the penetration testing in the world won’t amount to much if the software and routing configurations used in your infrastructure are buggy. But scanning systems for the tens of thousands of known vulnerabilities – and the dozens more that surface each week – would be simply impossible…without help. The OpenVAS vulnerability assessment suite brings together an actively curated database of vulnerabilities with powerful network scan and reporting tools.
[Read more…]