Ethical Hacking: Scanning Networks
This course will teach you the skills attackers use for scanning and that are needed for the CEH Exam.
Knowing all the targets on a network opens possibilities for attackers. In this course, Ethical Hacking: Scanning Networks, you’ll learn how attackers get a fuller understanding of how you’ve designed your infrastructure. First, you’ll explore how to discover different hosts on a network. Next, you’ll discover how to identify the operating systems being run on said targets. Finally, you’ll learn how to bypass IDS and firewall systems. When you’re finished with this course, you’ll have the skills and knowledge of how to scan a network for targets needed for the Certified Ethical Hacking Exam.
Author Name: Dale Meredith
Author Description:
Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale’s expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material. Straddling the line of fun and function, Dale’s instruction is memorable and entertaining. Dale’s knowl… more
Table of Contents
- Course Overview
1min - Summarizing Scanning and Its Goals
23mins - Understanding the 3-Way Handshake
16mins - Classifying the Types of Scanning
42mins - Discovering Live Hosts and Open Ports
18mins - Utilizing Banner Grabbing and OS Fingerprinting
17mins - Examining Vulnerability Scans
21mins - Building out Maps of the Network
9mins - Discovering Anonymizing Techniques
18mins - Domain Summary
3mins
There are no reviews yet.