- 2-3 hours worth of material
- LinkedIn Learning
- English
Course Overview
Become an ethical hacker. Learn how to detect network vulnerabilities through scanning, and use tools and techniques for evading IDS detection, concealing, spoofing, and tunneling.
Course Circullum
Introduction
- Scan the LAN
- What you should know
- Hacking ethically
- Setting up your virtual network
- Roadmapping a scan
- Scanning techniques
- Scanning vs. penetration testing
- Scanning IPv6 networks
- Port scanning countermeasures
- Challenge: Compare pen test from a vulnerability scan
- Solution: Compare pen test from a vulnerability scan
- The three-way handshake
- TCP flags
- Idle scans
- Scan and query DNS
- Scan using ICMP
- Banner grabbing
- Challenge: Using online tools for discovery
- Solution: Using online tools for discovery
- Map a network with Nmap
- Passive operating system discovery
- SSDP for discovery
- Other network mapping tools
- Scanning for vulnerabilities
- Discovering vulnerabilities with Acunetix
- Using commercial and free scanners
- Use hping
- Scan with Nikto
- Exploring NetScan Tools
- Intrusion detection systems
- Use IP fragmentation scan
- Staying anonymous
- Challenge: Draw a network diagram
- Solution: Draw a network diagram
- Hiding with onion routing
- Obscuring with Proxifier and SocksChain
- IP addresses spoofing countermeasures
- IP spoofing detection techniques
- HTTP
- SSH
- Defend against tunneling
- Next steps
Item Reviews - 3
Submit Reviews
This Course Include:
Introduction
- Scan the LAN
- What you should know
- Hacking ethically
- Setting up your virtual network
- Roadmapping a scan
- Scanning techniques
- Scanning vs. penetration testing
- Scanning IPv6 networks
- Port scanning countermeasures
- Challenge: Compare pen test from a vulnerability scan
- Solution: Compare pen test from a vulnerability scan
- The three-way handshake
- TCP flags
- Idle scans
- Scan and query DNS
- Scan using ICMP
- Banner grabbing
- Challenge: Using online tools for discovery
- Solution: Using online tools for discovery
- Map a network with Nmap
- Passive operating system discovery
- SSDP for discovery
- Other network mapping tools
- Scanning for vulnerabilities
- Discovering vulnerabilities with Acunetix
- Using commercial and free scanners
- Use hping
- Scan with Nikto
- Exploring NetScan Tools
- Intrusion detection systems
- Use IP fragmentation scan
- Staying anonymous
- Challenge: Draw a network diagram
- Solution: Draw a network diagram
- Hiding with onion routing
- Obscuring with Proxifier and SocksChain
- IP addresses spoofing countermeasures
- IP spoofing detection techniques
- HTTP
- SSH
- Defend against tunneling
- Next steps
- Provider:LinkedIn Learning
- Certificate:Certificate Available
- Language:English
- Duration:2-3 hours worth of material
- Language CC: