YoVDO

Ethical Hacking: Scanning Networks

Offered By: Pluralsight

Tags

Ethical Hacking Courses Operating Systems Courses Network Scanning Courses

Course Description

Overview

This course will teach you the skills attackers use for scanning and that are needed for the CEH Exam.

Knowing all the targets on a network opens possibilities for attackers. In this course, Ethical Hacking: Scanning Networks, you’ll learn how attackers get a fuller understanding of how you’ve designed your infrastructure. First, you’ll explore how to discover different hosts on a network. Next, you’ll discover how to identify the operating systems being run on said targets. Finally, you’ll learn how to bypass IDS and firewall systems. When you’re finished with this course, you’ll have the skills and knowledge of how to scan a network for targets needed for the Certified Ethical Hacking Exam.

Syllabus

  • Course Overview 1min
  • Summarizing Scanning and Its Goals 23mins
  • Understanding the 3-Way Handshake 16mins
  • Classifying the Types of Scanning 42mins
  • Discovering Live Hosts and Open Ports 18mins
  • Utilizing Banner Grabbing and OS Fingerprinting 17mins
  • Examining Vulnerability Scans 21mins
  • Building out Maps of the Network 9mins
  • Discovering Anonymizing Techniques 18mins
  • Domain Summary 3mins

Taught by

Dale Meredith

Related Courses

Advanced Python Scripting for Cybersecurity
Infosec via Coursera
Python for Command-and-control, Exfiltration and Impact
Infosec via Coursera
Fundamentos del Internet de las cosas (IoT): Seguridad I
Galileo University via edX
MSc Cyber Security
Coventry University via FutureLearn
Cyber Incident Response
Infosec via Coursera