



In this video we discussed Nessus Vulnerability Scan Analysis, based on popular request by my subscribers. I demonstrated the scan analysis using excel spreadsheet PIVOT Table. Computer Security Resource Center https://csrc.nist.gov/publications The free way to help the channel grow is by subscribing using the link below: https://www.youtube.com/c/KamilSec?su... *************Patreon & Channel Support******************* https://www.patreon.com/kamilSec?fan_landing=true ********Order your KamilSec (KS) Designs Merch:********** https://kamilsec.creator-spring.com/ ************************************************************** Buy me a coffee if you appreciate my work https://buymeacoffee.com/kamilsec CashApp: $Kamilzak Zelle: kaamilzak@gmail.com Paypal: https://paypal.me/MZakari Thank You!!! ************************************************************* ***You can download copies of the vulnerability scans from my Patreon page, link below*** https://www.patreon.com/kamilSec?fan_landing=true Udemy Affliate link: https://track.flexlinkspro.com/g.ashx?foid=1.39197.1000020157&trid=1257621.161087&foc=11&fot=9999&fos=2&fobs=380496&fobs3=1.39197.1000020157 VeeFLY Referral Link: https://veefly.com?referrer=318243 Connect with me on Social Media: Twitter: https://twitter.com/Kamilzak_1 Instagram: @Kamilzak1 E-Mail: Kaamilzak@gmail.com

AI Meets Cybersecurity: Automating Vulnerability Analysis with Microsoft Copilot (Hands-on)
333 views

AI Automation for Business Professionals
118 views

Governance Risk and Compliance (GRC)
498 views

Overview of the FedRAMP 800-53 Rev 5 New Test Case
822 views

Episode 9: Configuration Management Plan (CM-9 Explained) | KamilSec
787 views

Episode 8: System Component Inventory (CM-8 Explained) | KamilSec
579 views