Ethical Hacking: Scanning Networks

Created By
Lisa Bock via LinkedIn Learning
  • 2-3 hours worth of material
  • LinkedIn Learning
  • English
Ethical Hacking: Scanning Networks

Course Overview

Become an ethical hacker. Learn how to detect network vulnerabilities through scanning, and use tools and techniques for evading IDS detection, concealing, spoofing, and tunneling.

Course Circullum

Introduction
  • Scan the LAN
  • What you should know
  • Hacking ethically
  • Setting up your virtual network
1. Scanning Overview and Methodology
  • Roadmapping a scan
  • Scanning techniques
  • Scanning vs. penetration testing
  • Scanning IPv6 networks
  • Port scanning countermeasures
  • Challenge: Compare pen test from a vulnerability scan
  • Solution: Compare pen test from a vulnerability scan
2. Identifying Live Systems Using Protocols
  • The three-way handshake
  • TCP flags
  • Idle scans
  • Scan and query DNS
  • Scan using ICMP
  • Banner grabbing
  • Challenge: Using online tools for discovery
  • Solution: Using online tools for discovery
3. Blueprint the Network
  • Map a network with Nmap
  • Passive operating system discovery
  • SSDP for discovery
  • Other network mapping tools
4. Vulnerability Scanning
  • Scanning for vulnerabilities
  • Discovering vulnerabilities with Acunetix
  • Using commercial and free scanners
5. Scanning Tools
  • Use hping
  • Scan with Nikto
  • Exploring NetScan Tools
6. Evading Detection
  • Intrusion detection systems
  • Use IP fragmentation scan
  • Staying anonymous
  • Challenge: Draw a network diagram
  • Solution: Draw a network diagram
7. Concealing and Spoofing
  • Hiding with onion routing
  • Obscuring with Proxifier and SocksChain
  • IP addresses spoofing countermeasures
  • IP spoofing detection techniques
8. Tunneling
  • HTTP
  • SSH
  • Defend against tunneling
Conclusion
  • Next steps
out of 5.0
5 Star 85%
4 Star 75%
3 Star 53%
1 Star 20%

Item Reviews - 3

Submit Reviews

Free Trial Available

This Course Include:
Introduction
  • Scan the LAN
  • What you should know
  • Hacking ethically
  • Setting up your virtual network
1. Scanning Overview and Methodology
  • Roadmapping a scan
  • Scanning techniques
  • Scanning vs. penetration testing
  • Scanning IPv6 networks
  • Port scanning countermeasures
  • Challenge: Compare pen test from a vulnerability scan
  • Solution: Compare pen test from a vulnerability scan
2. Identifying Live Systems Using Protocols
  • The three-way handshake
  • TCP flags
  • Idle scans
  • Scan and query DNS
  • Scan using ICMP
  • Banner grabbing
  • Challenge: Using online tools for discovery
  • Solution: Using online tools for discovery
3. Blueprint the Network
  • Map a network with Nmap
  • Passive operating system discovery
  • SSDP for discovery
  • Other network mapping tools
4. Vulnerability Scanning
  • Scanning for vulnerabilities
  • Discovering vulnerabilities with Acunetix
  • Using commercial and free scanners
5. Scanning Tools
  • Use hping
  • Scan with Nikto
  • Exploring NetScan Tools
6. Evading Detection
  • Intrusion detection systems
  • Use IP fragmentation scan
  • Staying anonymous
  • Challenge: Draw a network diagram
  • Solution: Draw a network diagram
7. Concealing and Spoofing
  • Hiding with onion routing
  • Obscuring with Proxifier and SocksChain
  • IP addresses spoofing countermeasures
  • IP spoofing detection techniques
8. Tunneling
  • HTTP
  • SSH
  • Defend against tunneling
Conclusion
  • Next steps
  • Provider:LinkedIn Learning
  • Certificate:Certificate Available
  • Language:English
  • Duration:2-3 hours worth of material
  • Language CC:

Do You Have Questions ?

We'll help you to grow your career and growth.
Contact Us Today