When you enroll through our links, we may earn a small commission—at no extra cost to you. This helps keep our platform free and inspires us to add more value.

Ethical Hacking: Scanning Networks
This course will teach you the skills attackers use for scanning and that are needed for the CEH Exam.

This Course Includes
pluralsight
5 (80 reviews )
2 hour 54 minutes
english
Online - Self Paced
core courses
pluralsight
About Ethical Hacking: Scanning Networks
Knowing all the targets on a network opens possibilities for attackers. In this course, Ethical Hacking: Scanning Networks, you'll learn how attackers get a fuller understanding of how you've designed your infrastructure. First, you'll explore how to discover different hosts on a network. Next, you'll discover how to identify the operating systems being run on said targets. Finally, you'll learn how to bypass IDS and firewall systems. When you're finished with this course, you'll have the skills and knowledge of how to scan a network for targets needed for the Certified Ethical Hacking Exam.
What You Will Learn?
- Course Overview : 1min.
- Summarizing Scanning and Its Goals : 23mins.
- Understanding the 3-Way Handshake : 16mins.
- Classifying the Types of Scanning : 42mins.
- Discovering Live Hosts and Open Ports : 18mins.
- Utilizing Banner Grabbing and OS Fingerprinting : 17mins.
- Examining Vulnerability Scans : 21mins.
- Building out Maps of the Network : 9mins.
- Discovering Anonymizing Techniques : 18mins.
- Domain Summary : 3mins.