Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

TENABLE
UNIVERSITY

Join us for a special evening event for Tenable University attendees at Lucky Strike!

Tuesday, March 6

Tenable University Courses

A full day of hands-on labs where Tenable experts go deep into our solutions to help you hone your skills and take your deployment to the next level. Tenable University attendees will receive a certificate of completion which can be used for continuing professional education credits.
Discover and Assess | Product Architecture and Administration

Data Acquisition with Tenable.io - Active Scanning, Agents, and Passive Monitoring

2 / 12
TBD
TBA
INSTRUCTORS
Aubrey Smith
SESSION ABSTRACT
Tenable.io offers several approaches to security data acquisition to include active scanning, passive listening, and locally hosted agents. We will discuss the different approaches to data acquisition, advantages and challenges of each, and data integration into Tenable.io. Credentialed scanning, agent based security data acquisition, and effective passive data analysis will be included. The session will conclude with hands on exercises related to discussed topics.
X
Analyze, Measure and Model | Product Architecture and Administration

Tenable.io Asset Categorization

3 /12
TBD
TBA
INSTRUCTORS
Aubrey Smith
SESSION ABSTRACT
With Tenable.io you can break down network infrastructure into meaningful groupings for scanning, analysis, and visibility of data. We will discuss Tenable.IO’s unique approach to asset identification, the benefits, and how to group assets for scanning, analysis, and permissions. Topics will include web server group for web application scanning, identification of hosts with public IPs for special scans, and grouping of assets that require specific compliance scans to be performed.
X
Discover and Assess | Analyze, Measure and Model | Product Architecture and Administration

Tenable.io Cloud Security

1 / 12
TBD
TBA
INSTRUCTORS
Aubrey Smith
SESSION ABSTRACT
In the modern IT environment, acquiring security data on cloud services can be challenging. We will discuss the challenges in securing cloud assets and how to gather and scan data from various cloud environments such as Amazon Web Services (AWS), Microsoft Azure, Rackspace, and Salesforce. The session will conclude with hands on exercises related to discussed topics.
X
Discover and Assess | Analyze, Measure and Model | Product Architecture and Administration

Tenable.io Container Security

1 / 12
TBD
TBA
INSTRUCTORS
Scott Mohnkern, Ron Meldau, Dick Bussiere, Steve McGrath
SESSION ABSTRACT
Many organizations utilize pre-configured host images for rapid deployment. We will discuss how Tenable.io can scan these images for vulnerabilities prior to them being deployed in a live environment by creating and enforcing a security policy for images prior to deployment. The session will conclude with hands on exercises related to discussed topics.
X
Discover and Assess | Analyze, Measure and Model

Tenable.io Web Application Scanning

1 / 12
TBD
TBA
INSTRUCTORS
Scott Mohnkern, Ron Meldau, Dick Bussiere, Steve McGrath
SESSION ABSTRACT
Tenable.io provides automatic scanning of your web infrastructure for vulnerabilities commonly exploited in web applications. We will discuss how to use Tenable.io’s layered approach to web application scanning to identify vulnerabilities in your web infrastructure. The session will conclude with hands on exercises related to discussed topics.
X
Discover and Assess | Analyze, Measure and Model | Product Architecture and Administration

Industrial Security

1 / 12
TBD
TBA
INSTRUCTORS
Scott Mohnkern, Ron Meldau, Dick Bussiere, Steve McGrath
SESSION ABSTRACT
One of Tenable’s newest offerings, Industrial Security, provides the capability to monitor network activities in ICS networks. We will focus on planning an implementation in an electric utility though the considerations and recommendations presented can be helpful to similar environments like SCADA, manufacturing, healthcare, and others.
X
Product Architecture and Administration

Upgrading from SecurityCenter to Tenable.io

1 / 12
TBD
TBA
INSTRUCTORS
Aubrey Smith
SESSION ABSTRACT
Looking for help in upgrading from Tenable SecurityCenter to the new Tenable.io platform? In this session we will discuss how to improve your security posture by developing an upgrade strategy and making the switch to Tenable.io.
X
Product Architecture and Administration

SecurityCenter Advanced Scanning Techniques

1 / 12
TBD
TBA
INSTRUCTORS
Steve McGrath, Doug Baseley, Greg Tepe, Alex Choice, John Vasquez, Michael DeFazio
SESSION ABSTRACT
SecurityCenter can perform scans that do not interfere with your IT infrastructure. We will discuss creating scan blackout windows, scans that chain together in sequence to avoid excessive bandwidth utilization (dependent scans), importing partial scan results and handling incomplete scans (rollover scans), as well as configuration of scan zones and repositories to efficiently scan geographically diverse deployments. The session will conclude with hands on exercises related to discussed topics.
X
Discover and Assess

Policy and Compliance Auditing with SecurityCenter

1 / 12
TBD
TBA
INSTRUCTORS
Doug Baseley, Greg Tepe, Alex Choice, John Vasquez, Michael DeFazio
SESSION ABSTRACT
Every organization has security policies, hardening practices, and standardized configurations that can be verified through running compliance scans. Another driver is audit requirements like PCI, HIPAA, NIST 800-53, or ISO 27000. We will discuss how to perform compliance scanning, evaluating the results, and tips on making these scans work effectively. The session will conclude with hands on exercises related to discussed topics.
X
Analyze, Measure and Model

SecurityCenter Custom Reporting

1 / 12
TBD
TBA
INSTRUCTORS
Steve McGrath, Doug Baseley, Greg Tepe, Alex Choice, John Vasquez, Michael DeFazio
SESSION ABSTRACT
SecurityCenter’s reporting features include the ability to generate complex reports with data organized in some new and useful ways. We will discuss how to perform Host by Host security data reporting, generate warning indicator dashboards and alerts, as well as measuring Key Performance Indicators (KPI) in your infrastructure utilizing assurance report cards. The session will conclude with hands on exercises related to discussed topics.
X
Discover and Assess | Analyze, Measure and Model

SecurityCenter Scan Policy Tuning

1 / 12
TBD
TBA
INSTRUCTORS
Steve McGrath, Doug Baseley, Greg Tepe, Alex Choice, John Vasquez, Michael DeFazio
SESSION ABSTRACT
SecurityCenter provides you the capability of performing scans that acquire security data beyond a typical credentialed scan. We will discuss how to maximize scan performance, fine tune discovery, adjust for low bandwidth and scan fragile environments. The session will conclude with hands on exercises related to discussed topics.
X
Try for Free Buy Now

Try Tenable.io Vulnerability Management

FREE FOR 60 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now and run your first scan within 60 seconds.

Buy Tenable.io Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.