Ethical Hacking: Scanning Networks
This course will teach you the skills attackers use for scanning and that are needed for the CEH Exam.
What you'll learn
Knowing all the targets on a network opens possibilities for attackers. In this course, Ethical Hacking: Scanning Networks, you’ll learn how attackers get a fuller understanding of how you’ve designed your infrastructure. First, you’ll explore how to discover different hosts on a network. Next, you’ll discover how to identify the operating systems being run on said targets. Finally, you’ll learn how to bypass IDS and firewall systems. When you’re finished with this course, you’ll have the skills and knowledge of how to scan a network for targets needed for the Certified Ethical Hacking Exam.
Table of contents
- A Plethora of Scanning 2m
- Full Scans 1m
- Demo: Full Scan 5m
- Half-open/Stealth Scans 1m
- Demo: Half-open/Stealth Scans 3m
- Xmas Scans 1m
- Demo: Xmas Scans 2m
- FIN Scans 1m
- Demo: FIN Scans 2m
- NULL Scans 1m
- Demo: NULL Scans 1m
- UDP Scans 3m
- Listing and SSP Scans 1m
- Demo: Listing and SSP Scans 1m
- IDS Evasion Methods 5m
- More IDS Evasion Methods 2m
- Demo: Idle Scan and IP Fragment 6m
- Countermeasures 3m
- Learning Check 2m