YoVDO

Ethical Hacking: Scanning Networks

Offered By: Pluralsight

Tags

Ethical Hacking Courses Data Analysis Courses Cybersecurity Courses Port Scanning Courses Vulnerability Scanning Courses Network Scanning Courses

Course Description

Overview

Pluralsight is not an official partner or accredited training center of EC-Council. You know how to recon your target, now it's time to learn how to dig around what you've found for important, relevant data in preparation for your attack.

Pluralsight is not an official partner or accredited training center of EC-Council. So, after reconnaissance, we need to scan for basics, kind of like knocking on all the doors to see who is home and what they look like. Then, when you find a machine that's "live", we need to get to know it really well, asking some rather personal questions like, "what OS are you running?" or "what applications are you running?" and "which ports are listening on the network?". We'll go over all you'll need to know for the exam regarding scanning, and play with some pretty fun tools along the way. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking

Topics:
  • Overview of Scanning
  • Understanding the 3-way Handshake
  • Checking for "Live" Systems and Their Open Ports
  • Types of Scanning
  • Banner Grabbing and OS Fingerprinting
  • Vulnerability Scanning and Drawing Out the Network
  • Preparing Proxies and Other Anonymizing Techniques

Taught by

Dale Meredith

Related Courses

Practice Your First Penetration Test: Kali & Metasploit Lab
Udemy
TOTAL: CompTIA Security+ Certification Course + Exam SY0-701
Udemy
The Complete Ethical Hacking Course!
Udemy
Introduction To Python For Ethical Hacking
Udemy
Network Monitoring and Analysis
Pluralsight