Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Learn What You Want, When You Want

You need quality courses to make the most of your investment in Tenable. However, with busy schedules and tight budgets, it can be tough to find the time. To help our millions of users on their journey towards understanding and reducing their cybersecurity risk, Tenable is pleased to provide a comprehensive set of self-service courses for our entire product portfolio. With 24/7 access to courses, you can evaluate and learn about Tenable solutions on your schedule and focus your learning on the topics you need.

On-Demand Courses Available for Tenable.io, Nessus, SecurityCenter and More

On-demand course topics range from Vulnerability Assessment to Compliance, Auditing to Assurance Report Cards® (ARCs). Available for all Tenable.io™, Nessus®, SecurityCenter® and Nessus Network Monitor (formerly Passive Vulnerability Scanner® or PVS®) products, the on-demand courses are ideal for security analysts, knowledge workers and other professionals using or evaluating the Tenable product suite.

Existing Customer

Access Tenable University through the Tenable Support Portal.

Sign in Now

Not a Customer?

Access some Tenable University courses for free!

Public Sign Up

Courses Available

Tenable.io

Asset Management

Modules
  • Asset Management Overview
  • Asset Discovery Process
  • Discovering External Assets (Cloud Scanners)
  • Discovering Internal Assets (Nessus)
  • Discovering Cloud Assets (AWS)
  • Discovery with Integrations
  • Discovery with Passive Listening
  • Asset Categorization Process
  • Categorizing Assets
  • Basic Asset Analysis
  • Asset Tracking in Practice

Vulnerability Management

Modules
  • Vulnerability Management Overview
  • Vulnerability Assessment Overview
  • External Assessment
  • Internal Assessment
  • Agent Assessment
  • Automated Passive Listening
  • Cloud Assessment
  • Mobile Device Assessment
  • Authentication Coverage
  • Vulnerability Reporting
  • System Admin Reporting
  • Escalation Reporting
  • Success Reporting

Sensor Deployment

Modules
  • Sensor Deployment
  • Deploying Nessus Scanners
  • Deploying Nessus for AWS
  • Deploying Nessus Agents
  • Deploying Nessus Network Monitor

Web Application Scanning

Modules
  • Web Application Scanning Overview
  • Web Application Scanning Methods
  • Web Application Discovery
  • Basic Web Application Assessment
  • Extensive Web Application Assessment
  • Workbenches and Dashboards

Container Security

Modules
  • Container Security Overview
  • Policy Enforcement

SecurityCenter

Fundamentals of Managing SecurityCenter

Modules
  • Continuous Network Monitoring
  • The Beauty of Automation
  • Software Requirements and Downloading
  • Deployment Pre-Planning
  • Deployment Strategy Planning
  • Scan Zones
  • Roles, Groups, and Users
  • Repositories

SecurityCenter: Scanning and Analysis

Modules
  • Scan Overview
  • Credentialed Scanning
  • Vulnerability Scanning Overview
  • Infrastructure Scanning
  • Asset List Basics
  • Credentials
  • Scan Policies
  • Creating Scans
  • Analysis & Reporting Basics
  • Dashboards
  • Assurance Report Cards

Fundamentals of Managing SCCV

Modules
  • SCCV Product Overview
  • Software Requirements and Downloading
  • Passive Analysis Overview
  • Log Correlation Engine Overview
  • Deployment Strategy Planning
  • Nessus Agent Support
  • Adding an Agent Scanner
  • LCE Client Policy Configuration

SCCV: Event Analysis and Reporting

Modules
  • Vulnerability Analysis
  • Event Analysis Basics
  • Reporting Basics
  • Assurance Report Cards
  • Alerts
  • Tickets
  • Nessus Agent Data

Advanced Threat Detection

Modules
  • Data Collections
  • Going Hunting
  • Hunting the Known with Dashboards
  • Hunting the Known manually
  • Hunting the Unknown
  • Hunting the Unknown with Dashboards
  • Hunting the Unknown Manually
  • Insider Threat
  • Insider Threat User Tracking
  • Insider Threat User Tracking in Practice
  • Insider Threat Data Exfiltration
  • Targeted Intrusion Detection
  • Targeted IDS Configuration
  • Targeted IDS in Practice
  • Predicting Attack Paths
  • Identifying Trust
  • Carving the Path

The Nessus Sensor Suite

Nessus Professional

Courses
  • Deployment
  • Scanning
  • Analysis and Reporting
  • Compliance
  • Infrastructure Compliance
  • Application Compliance
  • Advanced Scanning

Nessus Manager

Courses
  • Deployment
  • Components
  • Scanning
  • Agents

Nessus Network Monitor

Courses
  • Introduction to Nessus Network Monitor
  • Nessus Network Monitor Deployment
  • Nessus Network Monitor Installation
  • Nessus Network Monitor Windows Installation
  • Nessus Network Monitor Linux Installation
  • Nessus Network Monitor Interface Introduction
  • Nessus Network Monitor Configuration Overview
  • Nessus Network Monitor Configuration Part 1
  • Nessus Network Monitor Configuration Part 2
  • Nessus Network Monitor Plugin Introduction
  • Nessus Network Monitor Basic Analysis
  • Nessus Network Monitor Basic Reporting
Try for Free Buy Now

Try Tenable.io

FREE FOR 60 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now and run your first scan within 60 seconds.

Buy Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

$2,190.00

Buy Now

Try for Free Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save

Try for Free Buy Now

Try Tenable.io Web Application Scanning

FREE FOR 60 DAYS

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now and run your first scan within 60 seconds.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578.00

Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security

FREE FOR 60 DAYS

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Learn More about Industrial Security