Wireless Penetration Testing: Up and Running: Run Wireless Networks Vulnerability Assessment, Wi-Fi Pen Testing, Android and iOS Application Security, and Break WEP, WPA, and WPA2 Protocols by Dr. Ahmed Hashem El Fiky

Wireless Penetration Testing: Up and Running: Run Wireless Networks Vulnerability Assessment, Wi-Fi Pen Testing, Android and iOS Application Security, and Break WEP, WPA, and WPA2 Protocols by Dr. Ahmed Hashem El Fiky

Author:Dr. Ahmed Hashem El Fiky [Fiky, Dr. Ahmed Hashem El]
Language: eng
Format: epub
Publisher: BPB Publications
Published: 2023-06-15T00:00:00+00:00


Configuring a Nessus vulnerability scan policy

Scan policies are basically a set of scanning instructions. Scan policies tell the scanner what duties to complete and how to complete them. You can choose from several pre-configured scan policy templates or customize a complex scan. The scanning capabilities of Nessus are divided into three categories by Tenable:

Discovery scan: Targets address space to report on live hosts and open ports.

Vulnerability scan: Targets endpoints to assess for known vulnerabilities.

Compliance scan: Targets endpoints to assess endpoint configuration for compliance with a particular standard (for example, Centre for Internet Security (CIS) benchmarks, Security Technical Implementation Guide (STIG), and so on).



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.