Ethical Hacking: Scanning Networks
Offered By: LinkedIn Learning
Course Description
Overview
Become an ethical hacker. Learn how to detect network vulnerabilities to prevent attacks on your organization's infrastructure and data.
Syllabus
Introduction
- Scanning the LAN
- Discovering resources
- Hacking ethically
- Setting up your virtual network
- Roadmapping a scan
- Outlining the TCP flags
- Leveraging the TCP three-way handshake
- Summarizing scanning tools
- Discovering Nmap
- Using hping3
- Locating network hosts
- Comparing ping scans
- Sending SYN and ACK scans
- Challenge: Identify a scanning signature
- Solution: Identify a scanning signature
- Evaluating port scanning methods
- Scanning IPv6 networks
- Identifying listening hosts using SCTP
- Using SSDP for discovery
- Optimizing scans with Nmap Script Engine
- Fingerprinting the OS
- Using Wireshark for OS discovery
- Employing IPv6 fingerprinting
- Harnessing the TTL value
- Mapping the network using Nmap
- Generating less noise
- Understanding the idle scan
- Firewalking the network
- Implementing stealth scans
- Manipulating packets
- Spoofing and cloaking
- Employing proxies
- Leveraging anonymizers
- Preventing scanning
- Detecting spoofing
- Challenge: Draw a network diagram
- Solution: Draw a network diagram
- Next steps
Taught by
Lisa Bock
Related Courses
اساسيات تحليل أمن الشبكات باستخدام WiresharkCoursera Project Network via Coursera Redes de computadores
Universidad del Rosario via edX Computer Networks and the Internet
Kiron via edX Initiation à Wireshark pour l'analyse de paquets sous linux
Coursera Project Network via Coursera Advance Your Skills as a Computer Forensics Specialist
LinkedIn Learning