Advanced Vulnerability Scanning and Analysis
RCCE students will learn configuring and interpreting results from industry-standard scanners like Nessus and Qualys. RCCE students will learn to apply industry-standard tools and techniques to identify weaknesses and verify security controls. The course covers practical scenarios ranging from initial setup to final reporting. RCCE students will learn to analyze complex systems and think like an attacker to better defend the organization. This comprehensive course delivers practical knowledge applicable to real-world cybersecurity operations. Starting from foundational concepts, RCCE students will learn through a combination of concept explanation, practical demonstration, and hands-on exercises.
- Security Engineers building defensive controls
- Security Analysts and Blue Team members
- Systems Administrators with security responsibilities
- GRC and Risk Professionals supporting controls
- Professionals implementing Advanced Vulnerability Scanning and Analysis
- Execute hands-on tasks for advanced vulnerability scanning
- Explain Course Overview fundamentals
- Execute hands-on tasks for what you will learn — covering Nessus and Qualys scanners, scan policies for diverse environments.
- Execute hands-on tasks for configure nessus and qualys scanners — covering scan policies for diverse environments.
- Execute hands-on tasks for course structure — covering 6 modules with progressive complexity, Concept explanation then demonstration.
- Execute hands-on tasks for vulnerability management lifecycle
- Execute hands-on tasks for continuous cycle — covering Not a one-time activity, Iterative improvement process.
- Execute hands-on tasks for key stakeholders — covering Security operations team, IT infrastructure owners.
- Design a scalable privilege management architecture with policy and enforcement
- Execute hands-on tasks for network scanners
- Execute hands-on tasks for agent-based scanners — covering Probe hosts from network perspective, Installed on target endpoints.
- Execute hands-on tasks for cloud-native scanners — covering DAST crawling and fuzzing.
| Module 01 | Advanced Vulnerability Scanning |
| Module 02 | Course Overview |
| Module 03 | What You Will Learn |
| Module 04 | Configure Nessus and Qualys scanners |
| Module 05 | Course Structure |
| Module 06 | Vulnerability Management Lifecycle |
| Module 07 | Continuous Cycle |
| Module 08 | Key Stakeholders |
| Module 09 | Scanner Architecture & Types |
| Module 10 | Network Scanners |
| Module 11 | Agent-Based Scanners |
| Module 12 | Cloud-Native Scanners |
| Module 13 | How Scanners Work Internally |
| Module 14 | Plugin Architecture |
All hands-on labs run on Rocheston Rose X OS. Students practice advanced vulnerability scanning and analysis by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.
- Lab 1: Execute hands-on tasks for advanced vulnerability scanning
- Lab 2: Explain Course Overview fundamentals
- Lab 3: Execute hands-on tasks for what you will learn
- Lab 4: Execute hands-on tasks for configure nessus and qualys scanners
- Lab 5: Execute hands-on tasks for course structure
Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for Advanced Vulnerability Scanning and Analysis, verifiable through the Rocheston certification portal.
- Full access to all course materials and slide decks
- Hands-on lab access on Rocheston Rose X OS environment
- Access to Rocheston CyberNotes
- Access to Rocheston Zelfire — EDR/XDR SIEM platform
- Access to Rocheston Raven — online cyber range exercise platform
- Access to Rocheston Vulnerability Vines AI