{"id":445,"date":"2019-07-01T17:16:14","date_gmt":"2019-07-01T17:16:14","guid":{"rendered":"https:\/\/www.siematry.com\/?p=445"},"modified":"2019-07-01T17:16:14","modified_gmt":"2019-07-01T17:16:14","slug":"want-to-learn-vulnerability-management","status":"publish","type":"post","link":"https:\/\/siematry.com\/?p=445","title":{"rendered":"Want to Learn Vulnerability Management?"},"content":{"rendered":"\n<p>As you start or continue your journey in Information Security (Info Sec), I&#8217;ve always recommend scanning an environment to actually learn what systems are present and relevant vulnerabilities.  When talking to interested minds, I suggest hands-on experience with tools to gain the insight.  There are various open source tools and demo commercial products that can be used to test.  One product that I recommend is <a href=\"https:\/\/www.tenable.com\/products\/nessus\/nessus-essentials\">Nessus Essentials<\/a>.  It will allow you to download and install the software to do a vulnerability assessment of your own network.  *Do not use this software outside of a network that you aren&#8217;t responsible for or own.* <\/p>\n\n\n\n<p>Learning the tool, processes, and results will definitely help you land a job sooner as you will be able to speak to similar scenarios in your own lab network vs the corporate networks.<\/p>\n\n\n\n<p><a href=\"http:\/\/www.openvas.org\">OpenVas<\/a> and <a href=\"https:\/\/www.kali.org\/downloads\/\">Kali<\/a> Linux are other vulnerability tools that can be used to learn vulnerability scanning.<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\"><\/div><\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As you start or continue your journey in Information Security (Info Sec), I&#8217;ve always recommend scanning an environment to actually&#8230;<\/p>\n","protected":false},"author":1,"featured_media":452,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[5],"tags":[],"class_list":["post-445","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-infosec"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/siematry.com\/index.php?rest_route=\/wp\/v2\/posts\/445","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/siematry.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/siematry.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/siematry.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/siematry.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=445"}],"version-history":[{"count":1,"href":"https:\/\/siematry.com\/index.php?rest_route=\/wp\/v2\/posts\/445\/revisions"}],"predecessor-version":[{"id":560,"href":"https:\/\/siematry.com\/index.php?rest_route=\/wp\/v2\/posts\/445\/revisions\/560"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/siematry.com\/index.php?rest_route=\/"}],"wp:attachment":[{"href":"https:\/\/siematry.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=445"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/siematry.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=445"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/siematry.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=445"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}