YoVDO

Scanning & Enumeration

Offered By: Cybrary

Tags

Penetration Testing Courses Network Security Courses Nmap Courses Vulnerability Assessment Courses

Course Description

Overview

Who should take this course?

This course is designed for beginner-to-intermediate level penetration testers and red team members who want to learn about the attack phase of Scanning and Enumeration.

What are the prerequisites for this course?

You will gain the most benefit from this course if you have mastered the following:

  • Proficient in using the Linux command line
  • Basic knowledge of ports, protocols, and services

Why should I take this course?

In this course, you will gain the following capabilities:

  • Interact with target systems and learn more about them
  • Scan networks to create a network map
  • Identify network assets, risks, and vulnerabilities
  • Enumerate various information about a target system
  • Perform proper documentation of the network terrain
  • Identify which tools suit your needs for scanning, enumeration, and documentation

What makes this course different from other courses on similar topics?

This course is part of a series on the Hacker Mindset and is taught by Ray Evans, a member of the Cydefe team. CyDefe develops and operates capture-the-flag (CTF) style environments, and this course focuses on presenting learners with virtual labs where they can dirctly apply what they've learned.

Why should I take this course on Cybrary and not somewhere else?

This course enables you to learn from one of the foremost experts in the field, and our on-demand format affords you the flexibility to learn at your own pace.


Syllabus

  • Introduction to Scanning and Enumeration
    • Scanning and Enumeration Overview
  • Scanning Tools
    • Scanning Tools Overview
    • Using Nmap for Scanning (Lab)
    • Using Netcat for Scanning
    • Using Netdiscover for Scanning
  • SNMP Enumeration
    • SNMP and SNMP Enumeration Tools (Lab)
  • Documentation for Scanning and Enumeration
    • Documentation Needs and Tools

Taught by

Raymond Evans

Related Courses

An Introduction to Computer Networks
Stanford University via Independent
Computer Networks
University of Washington via Coursera
Computer Networking
Georgia Institute of Technology via Udacity
Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Model Building and Validation
AT&T via Udacity