Tenable Attack Surface Management for External Security

Course to discover, monitor, and secure external attack surfaces.

rate limit

Code not recognized.

About this course

This course provides foundational building blocks needed to configure and operate Tenable Attack Surface Management for External Attack Surface Management (EASM), designed for individuals new to the solution and seeking basic level of proficiency. Partner Training | Tenable® Students will learn to identify and inventory internet-facing assets, assess external security posture, and monitor for unauthorized exposures. The curriculum covers asset discovery techniques, subdomain enumeration, and certificate monitoring for comprehensive attack surface visibility. Participants will gain hands-on experience with threat intelligence integration, brand protection monitoring, and third-party risk assessment capabilities. The course includes practical exercises in exposure prioritization, automated alerting configuration, and integration with existing security operations workflows. Students will develop skills in continuous external monitoring, threat landscape analysis, and proactive security posture management that reduces external attack vectors and protects organizational reputation.

Curriculum

  • Section 1
  • Example Text Lesson
  • Optional Section
  • Course Feedback Survey
  • SCORM Example

About this course

This course provides foundational building blocks needed to configure and operate Tenable Attack Surface Management for External Attack Surface Management (EASM), designed for individuals new to the solution and seeking basic level of proficiency. Partner Training | Tenable® Students will learn to identify and inventory internet-facing assets, assess external security posture, and monitor for unauthorized exposures. The curriculum covers asset discovery techniques, subdomain enumeration, and certificate monitoring for comprehensive attack surface visibility. Participants will gain hands-on experience with threat intelligence integration, brand protection monitoring, and third-party risk assessment capabilities. The course includes practical exercises in exposure prioritization, automated alerting configuration, and integration with existing security operations workflows. Students will develop skills in continuous external monitoring, threat landscape analysis, and proactive security posture management that reduces external attack vectors and protects organizational reputation.

Curriculum

  • Section 1
  • Example Text Lesson
  • Optional Section
  • Course Feedback Survey
  • SCORM Example

Looking for something else?

All Content Library