Ethical Hacking: Scanning Networks
Offered By: LinkedIn Learning
Course Description
Overview
Become an ethical hacker. Learn how to detect network vulnerabilities to prevent attacks on your organization's infrastructure and data.
Syllabus
Introduction
- Scanning the LAN
- Discovering resources
- Hacking ethically
- Setting up your virtual network
- Roadmapping a scan
- Outlining the TCP flags
- Leveraging the TCP three-way handshake
- Summarizing scanning tools
- Discovering Nmap
- Using hping3
- Locating network hosts
- Comparing ping scans
- Sending SYN and ACK scans
- Challenge: Identify a scanning signature
- Solution: Identify a scanning signature
- Evaluating port scanning methods
- Scanning IPv6 networks
- Identifying listening hosts using SCTP
- Using SSDP for discovery
- Optimizing scans with Nmap Script Engine
- Fingerprinting the OS
- Using Wireshark for OS discovery
- Employing IPv6 fingerprinting
- Harnessing the TTL value
- Mapping the network using Nmap
- Generating less noise
- Understanding the idle scan
- Firewalking the network
- Implementing stealth scans
- Manipulating packets
- Spoofing and cloaking
- Employing proxies
- Leveraging anonymizers
- Preventing scanning
- Detecting spoofing
- Challenge: Draw a network diagram
- Solution: Draw a network diagram
- Next steps
Taught by
Lisa Bock
Related Courses
Evaluación de peligros y riesgos por fenómenos naturalesUniversidad Nacional Autónoma de México via Coursera Internet Security
openHPI Planning a Security Incident Response
Microsoft via edX Cyber Security
CEC via Swayam Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam