Ethical Hacking: Scanning Networks
Offered By: LinkedIn Learning
Course Description
Overview
Become an ethical hacker. Learn how to detect network vulnerabilities to prevent attacks on your organization's infrastructure and data.
Syllabus
Introduction
- Scanning the LAN
- Discovering resources
- Hacking ethically
- Setting up your virtual network
- Roadmapping a scan
- Outlining the TCP flags
- Leveraging the TCP three-way handshake
- Summarizing scanning tools
- Discovering Nmap
- Using hping3
- Locating network hosts
- Comparing ping scans
- Sending SYN and ACK scans
- Challenge: Identify a scanning signature
- Solution: Identify a scanning signature
- Evaluating port scanning methods
- Scanning IPv6 networks
- Identifying listening hosts using SCTP
- Using SSDP for discovery
- Optimizing scans with Nmap Script Engine
- Fingerprinting the OS
- Using Wireshark for OS discovery
- Employing IPv6 fingerprinting
- Harnessing the TTL value
- Mapping the network using Nmap
- Generating less noise
- Understanding the idle scan
- Firewalking the network
- Implementing stealth scans
- Manipulating packets
- Spoofing and cloaking
- Employing proxies
- Leveraging anonymizers
- Preventing scanning
- Detecting spoofing
- Challenge: Draw a network diagram
- Solution: Draw a network diagram
- Next steps
Taught by
Lisa Bock
Related Courses
Introduction to Internetworking with TCP/IPopenHPI Computer Networks
University of Washington via Coursera Networking for Web Developers
Udacity Computer Networks and the Internet
Kiron via edX Introduction to TCP/IP
Yonsei University via Coursera