MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

Ethical Hacking: Scanning Networks

Course Summary

You know how to recon your target, now it's time to learn how to dig around what you've found for important, relevant data in preparation for your attack. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking


  • +

    Course Syllabus

    Overview of Scanning
    - 22m 48s

    —Overview of Scanning 3m 36s
    —What Is Scanning? 2m 18s
    —Types of Scanning 5m 15s
    —What's the Goal 4m 14s
    —What Techniques Are Used? 2m 45s
    —What Tools Are Used 2m 35s
    —Summary 2m 2s
    Understanding the 3-way Handshake
    - 21m 8s

    —Introduction 2m 0s
    —TCP Communications 4m 6s
    —UDP Communications 3m 42s
    —TCP Header Flags 3m 44s
    —Demo: Watch The 3-way Handshake 4m 41s
    —What If... 1m 22s
    —Summary 1m 31s
    Checking for "Live" Systems and Their Open Ports
    - 32m 5s
    Types of Scanning
    - 44m 18s
    Banner Grabbing and OS Fingerprinting
    - 30m 5s
    Vulnerability Scanning and Drawing Out the Network
    - 55m 51s
    Preparing Proxies and Other Anonymizing Techniques
    - 19m 41s


Course Fee:
USD 29

Course Type:

Self-Study

Course Status:

Active

Workload:

1 - 4 hours / week

Attended this course?

Back to Top

 
Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top