YoVDO

Scanning, Enumeration, and Vulnerabilities

Offered By: Cybrary

Tags

Vulnerability Assessment Courses Cybersecurity Courses Network Security Courses Ethical Hacking Courses Nmap Courses Enumeration Courses

Course Description

Overview

Attackers use scanning and enumeration to determine what live systems are on the network (host discovery) and additional information about those systems, like the operating system in use and software version. With vulnerability scanning, an attacker attempts to locate specific weaknesses in system software. Specifically, the attacker is hoping to find known vulnerabilities (CVE) that they can easily exploit. This course is designed to be predominantly hands-on and covers the theory of scanning, enumeration, and vulnerabilities at a high-level.


Syllabus

  • Introduction
    • Scanning & Enumeration Introduction
  • Check for Live Systems & Ports
    • Checking for Live Systems Lab Part 1
    • Checking for Live Systems Lab Part 2
    • Performing a Check for Live Systems
    • Checking for Open Ports Lab Part 1
    • Checking for Open Ports Lab Part 2
    • Performing a Check for Open Ports
  • Scanning
    • Scanning Introduction
    • Scanning with with NMAP Half Connect Scan
    • Scanning with NMAP Full Connect Scan
    • Scanning with XMAS Scan Part 1
    • Scanning with XMAS Scan Part 2
    • Scanning with NMAP ACK Scan
    • Scanning with NMAP ACK Scan and Windows Firewall
    • Scanning with hping3 and SYN Scan
    • Scanning with hping3 and ACK Scan
    • Scanning with hping3 and XMAS Scan
    • Scanning with hping3, ACK Scan, and Windows Firewall
    • Implementing Scanning Techniques
  • Fingerprinting & Banner Grabbing
    • OS Fingerprinting
    • OS Fingerprinting
    • Banner Grabbing
    • Banner Grabbing
  • Enumeration Tools
    • Zenmap
    • Dig and Finger Commands
    • Using Enumeration Tools
  • Vulnerabilities
    • Vulnerability Scanner Setup and Configuration of Core Impact Part 1
    • Vulnerability Scanner Setup and Configuration of Core Impact Part 2
    • Vulnerability Scanner Set-up and Configuration
    • Vulnerability Scanner Setup and Configuration of OpenVAS Part 1
    • Vulnerability Scanner Setup and Configuration of OpenVAS Part 2
    • Vulnerability Scanner Set-up and Configuration, Pt. 2
  • Conclusion
    • Vulnerability Scan Assessment Overview
    • Vulnerability Scan
    • Scanning, Enumerations, & Vulnerabilities Conclusion

Taught by

Ken Underhill

Related Courses

Security Principles
(ISC)² via Coursera
A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera
FinTech for Finance and Business Leaders
ACCA via edX
Access Control Concepts
(ISC)² via Coursera
Access Controls
(ISC)² via Coursera