Tenable Enterprise Product Training



Similar documents
eeye Digital Security Product Training

VULNERABILITY MANAGEMENT

June 19, (Revision 1)

WHITEPAPER. Nessus Exploit Integration

Unified Security Monitoring Best Practices

June 8, (Revision 1)

February 22, (Revision 2)

Patch Management Integration

Using the Tenable Solution to Audit and Protect Firewalls, Routers, and Other Network Devices May 14, 2013 (Revision 1)

April 11, (Revision 2)

Protecting Critical Infrastructure

Designing and Implementing a Server Infrastructure 20413C; 5 days, Instructor-led

September 2, (Revision 3)

SecurityCenter 4.4 Architecture

Continuous Network Monitoring

Nessus and Mobile Device Scanning. November 7, 2014 (Revision 12)

Tenable Network Security Support Portal. January 12, 2015 (Revision 14)

3D Tool 2.0 Quick Start Guide

SecurityCenter 4.2 Administration Guide

Outcome Based Security Monitoring in a Continuous Monitoring World

January 4, (Revision 1) The newest version of this document is available at the following URL:

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities

24/7 Visibility into Advanced Malware on Networks and Endpoints

20413C: Designing and Implementing a Server Infrastructure

Designing and Implementing a Server Infrastructure

Designing and Implementing a Server Infrastructure

Designing and Implementing a Server Infrastructure

How To Manage Security On A Networked Computer System

Planning, Deploying, and Managing an Enterprise Project Management Solution

COURSE 20413C: DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE

Speed Up Incident Response with Actionable Forensic Analytics

Sample Vulnerability Management Policy

Security Event Management. February 7, 2007 (Revision 5)

Designing and Implementing a Server Infrastructure

Course 20413: Designing and Implementing a Server Infrastructure

Cyber Security RFP Template

Installing and Configuring Windows Server 2012

Using Nessus to Detect Wireless Access Points. March 6, 2015 (Revision 4)

Build Your Knowledge!

Desingning and Implementing a Server Infrastructure

How To Monitor Your Entire It Environment

Managing Enterprise Devices and Apps using System Center Configuration Manager 20696B; 5 Days, Instructor-led

Installing and Configuring Windows Server 2012

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

May 11, (Revision 10)

10775 Administering Microsoft SQL Server Databases

Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability. 7 Jul 2014

Intro to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Tenable for Google Cloud Platform

Course 20410: Installing and Configuring Windows Server 2012

Lab Configuring Access Policies and DMZ Settings

Vulnerability Management

Nessus Agents. October 2015

COURSE 20410C: INSTALLING AND CONFIGURING WINDOWS SERVER 2012

Nessus Cloud User Registration

Tenable Product Evaluations Application: HIPAA

MCSA Server (Exam )

Designing and Implementing a Server Infrastructure Course#20413B

SecurityCenter 4.4 Administration Guide

BSM 9.0 ESSENTIALS. Instructor-Led Training

Course Syllabus. Configuring and Troubleshooting Internet Information Services in Windows Server Key Data. Audience. At Course Completion

MCSA/MCITP: Enterprise Windows Server 2008 Course 9952; 14 Days, Instructor-led

Installing and Configuring Windows Server 2012

Administering Microsoft SQL Server 2012 Databases

Designing and Implementing a Server Infrastructure

Intel Security Certified Product Specialist Security Information Event Management (SIEM)

Configuring Virtual Switches for Use with PVS. February 7, 2014 (Revision 1)

Course Outline: Course Designing and Implementing a Server Infrastructure

Blended Security Assessments

Administration of Clearwell ediscovery Platform 7.x Exam.

Tenable Webcast Summary Managing Vulnerabilities in Virtualized and Cloud-based Deployments

Microsoft Official Courseware

10775A Administering Microsoft SQL Server 2012 Databases

Module 1: Overview. Module 2: AlienVault USM Solution Deployment. Module 3: AlienVault USM Basic Configuration

Eliminating Cybersecurity Blind Spots

NOTE: Labs in this course are based on the General Availability release of Windows Server 2012 R2 and Windows 8.1.

APPLICATION FOR BOARD APPROVAL. Of Locally Developed Course. Cisco CCNA Certification 11/12

Creating the Conceptual Design by Gathering and Analyzing Business and Technical Requirements

NIIT Education and Training, Doha, Qatar - Contact: /1798;

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

SecurityCenter 5.1 with Nessus Agent Support. October 22, 2015

Designing and Implementing a Server Infrastructure

Below are the some of the new features of SQL Server that has been discussed in this course

IT Networking and Security

MS-10775: Administering Microsoft SQL Server 2012 Databases. Course Objectives. Required Exam(s) Price. Duration. Methods of Delivery.

Salesforce Certified Force.com Developer Study Guide

Managing Enterprise Security with Cisco Security Manager

Designing and Implementing a Server Infrastructure

Vistara Lifecycle Management

Nessus Enterprise Cloud User Guide. October 2, 2014 (Revision 9)

Course MS20696A Managing Enterprise Devices and Apps using System Center Configuration Manager

IBM Proventia Network Enterprise Scanner

Administering a Microsoft SQL Server 2000 Database

Microsoft SQL Server Beginner course content (3-day)

Real-Time Auditing for SANS Consensus Audit Guidelines

Exadata Database Machine Administration Workshop NEW

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage

Course Outline. Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led

Transcription:

Tenable Enterprise Product Training

Tenable Unified Security Monitoring for Analysts (5MD) This hands-on instructor led course provides security analysts with the skills and knowledge necessary to discover and report relevant information using the complete suite of Tenable products. Participants will learn to initiate active scans, evaluate vulnerabilities, monitor system compliance, analyze event trends and anomalies and customize reports to detail their findings. These techniques are intended to facilitate an organization's information assurance efforts through implementation of the Unified Security Monitoring strategy. IT Security Analysts that currently (or plan to) use Tenable SecurityCenter to perform security monitoring and vulnerability scanning of their networks. Introduction to Tenable's Unified Security Monitoring Approach Using Tenable's Online Resources Understanding Event, Vulnerability and Compliance Data The SecurityCenter User Interface Vulnerability and Compliance Scan Automation Data Analysis and Queries Workflow - Alerting and Ticketing The SecurityCenter Dashboard Custom Reporting This course provides security professionals with the necessary information to prepare for the Tenable Certified Security Analyst (TCSA) exam. Separate per exam attempt charge involved, please ask. Students should possess a basic understanding of TCP/IP networking, operating systems security and common client/server applications. Students should possess a basic understanding of TCP/IP networking, operating systems security and common client/server applications. Related Coursework Tenable SecurityCenter users that wish to get more advanced knowledge on creating custom scan policies and.audit policies should also attend Tenable Nessus Vulnerability & Compliance Auditing.

Tenable Unified Security Monitoring for Managers (5MD) This hands-on instructor led course provides security managers with the skills and knowledge necessary to effectively plan and implement an organizational structure using the complete suite of Tenable Network Security products. Participants will learn the building blocks of SecurityCenter management, evaluate role-based responsibilities within a security organization, organize systems and network segments into logical groups, construct a hypothetical organization optimized to monitor system security and compliance, analyze event trends and anomalies, and customize reports to detail findings. These techniques are intended to facilitate effective management, oversight and delegation of duties within a security organization. IT Security Managers that currently (or plan to) use Tenable SecurityCenter to perform security monitoring and vulnerability scanning of their networks. Introduction to Tenable's Unified Security Monitoring Approach Understanding the SecurityCenter Structure Planning the Organizational Structure Asset Management Account Management - Roles and Access Information Management Workflow - Alerting and Ticketing SecurityCenter Dashboard Custom Reporting This course provides security professionals with the necessary information to prepare for the Tenable Certified Security Manager (TCSM) exam. Separate per exam attempt charge involved, please ask. Students should possess a basic understanding of standard security best practices and their internal security and compliance policies. Students should have a basic understanding of TCP/IP networking, operating systems security and common client/server applications.

Tenable Unified Security Monitoring for Administrators (5MD) This course is designed to prepare system administrators of the Tenable Unified Security Monitoring solution to optimally plan and deliver a physical deployment of the Tenable Unified Security Monitoring components. This hands-on instructor led course allows administrators to walk through a physical deployment in a lab environment while receiving detailed explanations of the technologies involved with each component. This includes command line installation and both command line and GUI configuration of Tenable SecurityCenter, Tenable Nessus, the Tenable Log Correlation Engine (LCE) and the Tenable Passive Vulnerability Scanner (PVS). IT Security Administrators that currently (or plan to) deploy and maintain Tenable's Enterprise security products (SecurityCenter, Log Correlation Engine, Passive Vulnerability Scanner and Nessus) within their organization. Introduction to Tenable's Unified Security Monitoring Approach Pre-installation Planning Software Installation Organizational Planning and Data Management SecurityCenter User Interface Scan Zones Repositories Organizations LCE PVS Maintenance and Upgrades This course provides security professionals with the necessary information to prepare for the Tenable Certified Product Administrator (TCPA) exam. Separate per exam attempt charge involved, please ask. Students should have experience with Unix/Linux command line administration and common TCP/IP network protocols. Students should possess a basic understanding of TCP/IP networking, operating systems security and common client/server applications.

Tenable Nessus Vulnerability and Compliance Auditing (5MD) This instructor-led or On Demand hands-on course provides security professionals with the skills and knowledge necessary to perform vulnerability and compliance scanning of supported operating systems, devices and applications. Students will construct custom scan policies for topology discovery, network vulnerability detection, credentialed patch audits and compliance benchmarks and discuss the underlying technologies utilized by the Nessus scanner. IT security analysts, security consultants or auditors that wish to use all of the features available as part of the Nessus ProfessionalFeed. Tenable SecurityCenter users that wish to gain an in depth understanding of Tenable Nessus vulnerability scanning and how to create custom scan policies and.audit files to perform configuration auditing. Introduction to Tenable Nessus and Vulnerability Scanning Nessus Installation and Administration Basic Nessus Scan Operation Nessus Scan Configuration and Policy Creation Vulnerability Analysis and Reporting with Nessus Advanced Scan Configuration and Policy Creation Introduction to Compliance and Auditing Nessus Auditing Features Windows System Auditing Unix System Auditing Cisco IOS Auditing Nessus Database Auditing Nessus Content Auditing Auditing to Industry Guidelines Auditing to Federal Guidelines This course provides students with the necessary information to prepare for the Tenable Certified Nessus Auditor (TCNA) exam. Separate per exam attempt charge involved, please ask. Students should possess a basic understanding of TCP/IP networking, operating systems security and common client/server applications. Students should have administrative access to their laptop and possess a basic understanding of TCP/IP networking, operating systems security and common client/server applications.