Ethical Hacking: Scanning Networks
Offered By: Pluralsight
Course Description
Overview
This course will teach you the skills attackers use for scanning and that are needed for the CEH Exam.
Knowing all the targets on a network opens possibilities for attackers. In this course, Ethical Hacking: Scanning Networks, you’ll learn how attackers get a fuller understanding of how you’ve designed your infrastructure. First, you’ll explore how to discover different hosts on a network. Next, you’ll discover how to identify the operating systems being run on said targets. Finally, you’ll learn how to bypass IDS and firewall systems. When you’re finished with this course, you’ll have the skills and knowledge of how to scan a network for targets needed for the Certified Ethical Hacking Exam.
Knowing all the targets on a network opens possibilities for attackers. In this course, Ethical Hacking: Scanning Networks, you’ll learn how attackers get a fuller understanding of how you’ve designed your infrastructure. First, you’ll explore how to discover different hosts on a network. Next, you’ll discover how to identify the operating systems being run on said targets. Finally, you’ll learn how to bypass IDS and firewall systems. When you’re finished with this course, you’ll have the skills and knowledge of how to scan a network for targets needed for the Certified Ethical Hacking Exam.
Syllabus
- Course Overview 1min
- Summarizing Scanning and Its Goals 23mins
- Understanding the 3-Way Handshake 16mins
- Classifying the Types of Scanning 42mins
- Discovering Live Hosts and Open Ports 18mins
- Utilizing Banner Grabbing and OS Fingerprinting 17mins
- Examining Vulnerability Scans 21mins
- Building out Maps of the Network 9mins
- Discovering Anonymizing Techniques 18mins
- Domain Summary 3mins
Taught by
Dale Meredith
Related Courses
Practice Your First Penetration Test: Kali & Metasploit LabUdemy TOTAL: CompTIA Security+ Certification Course + Exam SY0-701
Udemy The Complete Ethical Hacking Course!
Udemy Introduction To Python For Ethical Hacking
Udemy Network Monitoring and Analysis
Pluralsight