oluwaseyi Akilude
oluwaseyi Akilude
  • 60
  • 70 110
Episode 2: Uncovering Qualys WAS Configuration Secrets
in this video, we uncover the secrets of Qualys Web Application Scanning configuration. Learn how to optimize your web application scanning process for better security and compliance.
The Configuration settings include the following;
1. Option profile
2. Brute-force List
3. Search Lists
4. Parameters Sets
5. DNS Override Settings
6. Virtual Appliance
7. Global Settings
Timestamps
00:00 Episode2 : Qualys WAS Configuration Settings while Testing Web Application
02:46 Creating new Option Profile
16:18 Creating Brute-force List
18:09 Creating Search Lists
22:17 Creating Parameter Sets
23:09 Creating DNS Override Sets
24:12 Adding a Virtual Appliance
30:46 Using Global Settings
32:19 Applying Configurations Settings (Options Profile and DNS Override)
#WebApplicationScanning #QualysWAS #Cybersecurity
Enjoy!!
Please Like, Share and Subscribe
Переглядів: 148

Відео

Episode 1: Onboarding a Web Application on Qualys WAS (Web Application Scanning Demo using Qualys)
Переглядів 7184 місяці тому
This Video demonstrate how to onboard a web application on Qualys WAS for Dynamic Application Security Testing (DAST)
Step-by-Step Cisco ASA Remote Access: From Novice to Expert
Переглядів 345 місяців тому
This comprehensive video takes you on a journey, transforming you from a novice to an expert in configuring secure remote access for your network. Follow along with the clear step-by-step instructions and hands-on demonstrations to gain the confidence to manage remote access on your Cisco ASA like a pro. Don't wait, click play and unlock the power of secure remote access with Cisco ASA!
How to configure ASA Firewall IP Connectivity and Security Levels
Переглядів 945 місяців тому
In this video, we will dive deep into learning the configuration of the Cisco ASA Firewall. Whether you are a network engineer looking to enhance your skills or someone interested in cybersecurity, this tutorial will provide valuable insights on effectively configuring and managing a Cisco ASA Firewall. In this video, I specifically focused on how to configure IP addresses on the ASA firewall i...
Reporting Metrics in Vulnerability Management
Переглядів 3026 місяців тому
In this video, I spoke about the following learning objectives; 1. What is Reporting in Vulnerability Management 2. Key Considerations when creating a report. 3. Common Vulnerability Management KPIs 4. Reporting Tools. Enjoy!
CIS Benchmark Compliance Scan Video
Переглядів 5 тис.Рік тому
In this Video, I addressed System Hardening using the CIS-CAT Lite tool. CIS Benchmarks: www.cisecurity.org/cis-benchmarks-overview NIST - SP 800-123(General Server Security) and 800-53B(Security and Privacy Control) nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-123.pdf & nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r5.pdf European Network and Information Security...
Vulnerability Management Engineer Interview Tips and Questions
Переглядів 3,5 тис.Рік тому
In this video, I described how to prepare for a Vulnerability Management Engineer role interview. Enjoy!!
Vulnerability Scanning (Authenticated vs Non-Authenticated Scans)
Переглядів 936Рік тому
This videos provides details as to why running authenticated scans is very beneficial to your organization. I did a vivid comparison between both. Enjoy. Please Like, Share and Subscribe
Leveraging the Mitre ATT&CK Framework to analyse vulnerabilities
Переглядів 591Рік тому
In this video, I describe how you can leverage the MITRE ATT&CK Framework to further analyze a vulnerability to determine its impact. In addition, some tactics and techniques an adversarial group could use to exploit such vulnerabilities. I also described how you can create a Vulnerability register using some parameters from the Mitre ATT&CK Framework. Enjoy. Mitre ATT&CK Framework: attack.mitr...
Vulnerability Management Demo using Qualys without Background Music
Переглядів 7 тис.Рік тому
Vulnerability Management Demo using Qualys without Background Music
Safeguarding your Organization from Cyber Attacks with Qualys Patch management Demo.
Переглядів 557Рік тому
In this video, I covered the following Learning Objectives; 1. What does it mean to Patch a Vulnerability? 2. Processes involved in Patch Management 3. Patch Management Demo with Qualys. Enjoy!!
Regulatory Compliance with Qualys Part 2
Переглядів 1 тис.Рік тому
In this Second part, I demonstrated how you can actually achieve policy compliance with Qualys using its components. Enjoy!!!
Regulatory Compliance with Qualys Part 1
Переглядів 1,3 тис.Рік тому
Hello Everyone, In this video, I spoke about the following objectives: 1. What does it mean to be Compliant? 2. Qualys Policy Management products. 3. Components involved with Policy Compliance using Qualys. Enjoy!!!!
Vulnerability Management Demo with Qualys
Переглядів 14 тис.Рік тому
Vulnerability Management Demo with Qualys
Best Practice to Implement Vulnerability Management
Переглядів 684Рік тому
Best Practice to Implement Vulnerability Management
Tools used to implement Vulnerability Management
Переглядів 902Рік тому
Tools used to implement Vulnerability Management
The Processes Involved in Vulnerability Management
Переглядів 692Рік тому
The Processes Involved in Vulnerability Management
Understanding why vulnerability Management is important.
Переглядів 1 тис.Рік тому
Understanding why vulnerability Management is important.
Difference between Vulnerability Management and Vulnerability Assessment
Переглядів 1,1 тис.2 роки тому
Difference between Vulnerability Management and Vulnerability Assessment
The Definition of Vulnerability Management.
Переглядів 2,1 тис.2 роки тому
The Definition of Vulnerability Management.
Vulnerability Management Course
Переглядів 2,1 тис.2 роки тому
Vulnerability Management Course
Custom rules Part3
Переглядів 1482 роки тому
Custom rules Part3
Custom rule part 2
Переглядів 2922 роки тому
Custom rule part 2
Custom Rule Part 1
Переглядів 3482 роки тому
Custom Rule Part 1
Applying vPatch rules on Databases using McAfee DAM
Переглядів 4752 роки тому
Applying vPatch rules on Databases using McAfee DAM
Vulnerability Scans using McAfee DAM
Переглядів 6312 роки тому
Vulnerability Scans using McAfee DAM
Installing McAfee DAM on Redhat
Переглядів 4362 роки тому
Installing McAfee DAM on Redhat
Implementing DAM using McAfee
Переглядів 1,3 тис.2 роки тому
Implementing DAM using McAfee
Introduction to Database Activity Monitoring (DAM)
Переглядів 4,6 тис.2 роки тому
Introduction to Database Activity Monitoring (DAM)

КОМЕНТАРІ

  • @Ikpugha
    @Ikpugha 23 дні тому

    Well done Oluwaseyi, however, you did not capture a critical area of the VM lifecycle - Risk-based prioritization of vulnerabilities…

  • @EverGreenElephant
    @EverGreenElephant Місяць тому

    Is there a good alternative to Qualys?

  • @rambhupal6911
    @rambhupal6911 Місяць тому

    Great

  • @beshbarmaknews
    @beshbarmaknews Місяць тому

    cool intro!!!

  • @michaelaveriyire9822
    @michaelaveriyire9822 Місяць тому

    Great video, than you for this valuable information

  • @rcp1331
    @rcp1331 Місяць тому

    Absolutely valuable. Now I understand fully how to ensure we comply with CIS benchmarks. Tks very much Seyi

  • @fmartinez004
    @fmartinez004 2 місяці тому

    no music in the background please

  • @marialipy
    @marialipy 3 місяці тому

    This is amazing! Thank you. Please create more videos. You are a great teacher.

  • @onyerekene7586
    @onyerekene7586 3 місяці тому

    Thanks so much for this! Very educative and informative!

  • @wyllz4746
    @wyllz4746 4 місяці тому

    Great video Oluwaseyi. I'm curious to know if you've tried other web app scanners, like Tenable, and why you may prefer Qualys over these. I'm currently looking for the right solution for my company and any advice will be helpful. Thanks

    • @oluwaseyiakilude
      @oluwaseyiakilude 4 місяці тому

      Hi, Yes, I have. I just prefer using Qualys because of its availability and quick access. Other tools are more demo based. A good tool to try is also burp suite. I hope this helps

  • @scary_user
    @scary_user 4 місяці тому

    So heres my first question Sir, I notices on the CSI lite interface we are only presented with benchmark for Enterprise edition of windows. does it mean this benchmark cannot work for other editions of windows like the pro, home etc.. please I anticipate your answer. though I make some research as regard Windows Enterprise, and i get to know we have the enterprise and standalone licensing, enterprise offers more features for workstation and standalone are mostly for PC's. I dont know if my research are accurate Sir, Please i need your guidance or what to readup on to better understand this. thanks in anticipation.

    • @oluwaseyiakilude
      @oluwaseyiakilude 4 місяці тому

      Hi Tobi, thank you for your feedback. They only offer for few operating system because of its limited version. When I did the demo for this video I could only work on. Windows 10. My advise is to run CIS. Compliance based scan with any of your existing tools such as Tenable, qualys etc. And please don't break things 😂😂😂. Ensure you are learning within your far environment.

  • @scary_user
    @scary_user 4 місяці тому

    Coming accross this videos is the best thing that happens to me today, I have been reading up on this topic for quite sometimes and researching on CIS and its implemention but you really make it so simple... Mr. Seyi your indepth explanation answers most of my questions and curiocity... I cant wait to jump into my environment to destroy things, learn new things and explore the more on this topic... Im on the look for more security videos from your well of knowledge Sir. Thanks so much..

  • @henryeke3410
    @henryeke3410 5 місяців тому

    Greetings Mr. Akilude, I recently came across your VM course and was impressed by your proficient teaching style. I just completed cybersecurity training; I've developed a keen interest in Vulnerability Management. I'd love to connect with you for networking opportunities. Best regards, Henry

    • @oluwaseyiakilude
      @oluwaseyiakilude 5 місяців тому

      Thank you fir reaching out. God bless you 🙏

  • @kingsleyandang4739
    @kingsleyandang4739 5 місяців тому

    it was valuable information, thanks alot for the tips, the volume was very low

  • @alexop22
    @alexop22 5 місяців тому

    Thanks Oluwaseyi, have u used a tool to automate the benchmarks policies for large numbers of windows machines?

    • @oluwaseyiakilude
      @oluwaseyiakilude 3 місяці тому

      Your vulnerability management tool can also assist with this

  • @beautyexpert6481
    @beautyexpert6481 5 місяців тому

    From Nigeria, can I work as a Vulnerability engineer abroad remotely?

  • @olufemiojesanmi4773
    @olufemiojesanmi4773 5 місяців тому

    this video serves as a valuable resource for cybersecurity professionals seeking to enhance their vulnerability management strategies. Looking forward to more informative content like this in the future!"

  • @ezgi1
    @ezgi1 5 місяців тому

    can you take enable the subscribes, thank you

  • @francisfrancis1153
    @francisfrancis1153 5 місяців тому

    Thanks. I find out that you are knowledgeable in this domain. My advice is to revamp you videos and spread it more.

    • @oluwaseyiakilude
      @oluwaseyiakilude 5 місяців тому

      Hello Francis. Thank you for the advice. I am working on that. ❤️❤️❤️

  • @user-iq1vr6my9e
    @user-iq1vr6my9e 7 місяців тому

    Nice video, i want to learn more on vmdr, I will need a pri ate instructor. Can u do this for me?

    • @oluwaseyiakilude
      @oluwaseyiakilude 6 місяців тому

      Hi Basi, apologies for the delay in response. Yes I do. Please reach me via email: seyiakilude@yahoo.com

  • @michaelaveriyire9822
    @michaelaveriyire9822 8 місяців тому

    Great video, easy to understand

  • @ug1502ez
    @ug1502ez 8 місяців тому

    Wow! Very nice content. I'm going to harden my computer

  • @ishwaryanarayan1010
    @ishwaryanarayan1010 8 місяців тому

    Can you make video on SIEM , SOAR demo

  • @ishwaryanarayan1010
    @ishwaryanarayan1010 8 місяців тому

    Great video very informative. Thanks for reuploading again

  • @adeniyiladenegan7450
    @adeniyiladenegan7450 9 місяців тому

    Amazing video.Thank you so much for this.

  • @Lumpsum123
    @Lumpsum123 9 місяців тому

    Can you turn music off or speak louder please? Thank you

    • @oluwaseyiakilude
      @oluwaseyiakilude 9 місяців тому

      Hello, thank you for the observations. But I have another on my channel with no background music

  • @user-kj6wy3fu3o
    @user-kj6wy3fu3o 9 місяців тому

    I am interested. I sent you an email please respond

  • @willy.h.a
    @willy.h.a 9 місяців тому

    background sound is the problem

  • @user-wq8sh9ys7s
    @user-wq8sh9ys7s 10 місяців тому

    hi akilude, am a student pursuing a BSc networking and cyber security. i would love to acquire skill in vulnerability management and PCI DSS compliance using Qualys tool to gain that expertise. i will be glad thanks

  • @thepuldarshana9056
    @thepuldarshana9056 10 місяців тому

    both switches should have same group number and channel number right ? but you set 2 numbers, how does this work ?

  • @gabriellalaplace
    @gabriellalaplace 10 місяців тому

    If I do the Qualys VMDR Course can I get a job, or do I have to do all the courses in the Qualys Vulnerability Management section. Also, if I do all those courses, do I have to get additional certifications like A+, Network+ and Security+ to get a job. What do you think someone would have to study in order to get a job as a Vulnerabilty Scanner or other professions related to Qualys. Also, do you know if there is anywhere online where people can do Qualys projects together to get experience to put on a resume and help. So, what do you think I should study. 1. Qualys VMDR -> maybe all the other Qualys Vulnerability Management Courses -> Maybe some certifications. You've had a tech job for a long while now, what do you suggest I study for a role where I use Qulays. I also do not want a job with coding.

    • @Pele316
      @Pele316 7 місяців тому

      Qualys is a tool used to manage your environment. It by no means teaches you what you'll need to know in order to monitor at the base level without Qualys meaning if you go to a place without it you're SOL. If you're starting out, yes, look into A+ > Network+ > Security+. Those all help develop if not justify that you have a baseline of knowledge when applying for a job. If possible, look for an entry level position with room to grow where they provide assistance in obtaining those certifications.

  • @dwise1StreamingJoy
    @dwise1StreamingJoy 10 місяців тому

    wow , i was asked this Question ...thank you sir

  • @guitarbaba1
    @guitarbaba1 11 місяців тому

    Great video

  • @dwise1StreamingJoy
    @dwise1StreamingJoy 11 місяців тому

    this is making alot of sense. thank you so so much sir.

  • @anthonyceze5589
    @anthonyceze5589 11 місяців тому

    this is very helpful

  • @anthonyceze5589
    @anthonyceze5589 11 місяців тому

    Great clip, You too much

  • @virtueaansiweamai3071
    @virtueaansiweamai3071 Рік тому

    never had a more detailed demo. Thank you so much

  • @sekarc6160
    @sekarc6160 Рік тому

    Could you please release a video for CentOS,how to install DAM on CentOS7

    • @oluwaseyiakilude
      @oluwaseyiakilude Рік тому

      It's the same procedure to install as used in Redhat

    • @sekarc6160
      @sekarc6160 Рік тому

      @@oluwaseyiakilude tried but it's not working..

  • @mapletech_22
    @mapletech_22 Рік тому

    This is great 👍 👌

  • @dannya1130
    @dannya1130 Рік тому

    Thanks, Bro... Valuable information. Low volume and small writing space but solid info. Thanks

  • @dwise1StreamingJoy
    @dwise1StreamingJoy Рік тому

    May the lord bless you for this, you made be cleared my interview and Got a Good role

    • @oluwaseyiakilude
      @oluwaseyiakilude Рік тому

      Congratulations. So happy to hear this🙏🙏❤️❤️

  • @dwise1StreamingJoy
    @dwise1StreamingJoy Рік тому

    The main difference between TCP (transmission control protocol) and UDP (user datagram protocol) is that TCP is a connection-based protocol and UDP is connectionless. While TCP is more reliable, it transfers data more slowly. UDP is less reliable but works more quickly

  • @michaelfernandez7705
    @michaelfernandez7705 Рік тому

    Sir, your comment is wrong reagrding TCP and UDP. TCP is reliable but slower. UDP is fast but not reliable.

    • @oluwaseyiakilude
      @oluwaseyiakilude Рік тому

      Thank you Micheal for the observations. I do appreciate. Yes, you are right. 👍

    • @oluwaseyiakilude
      @oluwaseyiakilude Рік тому

      But in terms of scanning TCP scans are more faster compared to UDP scans. You can check this link as reference: www.varonis.com/blog/port-scanning-techniques#:~:text=UDP%20scans%20are%20slower%20than,specific%20payload%20to%20the%20target.

  • @puveeM
    @puveeM Рік тому

    Thank you for sharing.. really helpful

  • @dwise1StreamingJoy
    @dwise1StreamingJoy Рік тому

    I'm interested in the classes, can you send me the link please. Thanks alot

    • @oluwaseyiakilude
      @oluwaseyiakilude Рік тому

      Hi. Thanks for your feedback. You can reach me via email: seyiakilude@yahoo.com

  • @dwise1StreamingJoy
    @dwise1StreamingJoy Рік тому

    You have a Good knowledge you are giving out but you have to make your writing bolder and in Good Graphic so thos channel can move to a greater level. Thank you sir for all your so

  • @dwise1StreamingJoy
    @dwise1StreamingJoy Рік тому

    wow ---- may God bless your parents

  • @shalomabebefe3654
    @shalomabebefe3654 Рік тому

    Thanks alot for this

  • @nosferatu122
    @nosferatu122 Рік тому

    wtf is that writing

  • @texashighered9539
    @texashighered9539 Рік тому

    very powerful tutorials. Please can u give this video a timeline so that newbies can know how you transition from one topic to the next?