May 23, 2024, 4 a.m. | MyDFIR

MyDFIR www.youtube.com

This video provides a step-by-step guide on how to configure Metasploitable 2, a deliberately vulnerable virtual machine used for training and testing security tools and techniques, alongside OpenVAS, a comprehensive open-source vulnerability scanner. Discover how to install, configure, and utilize these tools to perform security audits and vulnerability assessments on your systems.

Metasploitable2: https://sourceforge.net/projects/metasploitable/
Splunk: https://youtu.be/iaBJ-PK8_RI
AD Project: https://youtu.be/mWqYyl89QaY
_________________________________
SIGN UP FOR MY SOC COURSE:

With 8 chapters and 30+ hands-on labs tailored to security operations, I am focused …

assessments audits discover guide install machine openvas scanner security security tools setup systems techniques testing tools training tutorial video virtual virtual machine vulnerability vulnerability scanner vulnerable

Information Technology Specialist I: Windows Engineer

@ Los Angeles County Employees Retirement Association (LACERA) | Pasadena, California

Information Technology Specialist I, LACERA: Information Security Engineer

@ Los Angeles County Employees Retirement Association (LACERA) | Pasadena, CA

Vice President, Controls Design & Development-7

@ State Street | Quincy, Massachusetts

Vice President, Controls Design & Development-5

@ State Street | Quincy, Massachusetts

Data Scientist & AI Prompt Engineer

@ Varonis | Israel

Contractor

@ Birlasoft | INDIA - MUMBAI - BIRLASOFT OFFICE, IN