Companies Home Search Profile

Ethical Hacking: Scanning Networks

Focused View

Lisa Bock

2:15:51

11 View
  • 01 - Scanning the LAN.mp4
    01:04
  • 02 - Discovering resources.mp4
    01:02
  • 03 - Hacking ethically.mp4
    00:57
  • 04 - Setting up your virtual network.mp4
    01:33
  • 01 - Roadmapping a scan.mp4
    03:19
  • 02 - Outlining the TCP flags.mp4
    05:23
  • 03 - Leveraging the TCP three-way handshake.mp4
    04:37
  • 04 - Summarizing scanning tools.mp4
    04:58
  • 05 - Discovering Nmap.mp4
    02:54
  • 06 - Using hping3.mp4
    04:37
  • 01 - Locating network hosts.mp4
    04:21
  • 02 - Comparing ping scans.mp4
    04:52
  • 03 - Sending SYN and ACK scans.mp4
    03:51
  • 04 - Challenge Identify a scanning signature.mp4
    01:43
  • 05 - Solution Identify a scanning signature.mp4
    04:28
  • 01 - Evaluating port scanning methods.mp4
    04:41
  • 02 - Scanning IPv6 networks.mp4
    04:49
  • 03 - Identifying listening hosts using SCTP.mp4
    04:31
  • 04 - Using SSDP for discovery.mp4
    04:16
  • 05 - Optimizing scans with Nmap Script Engine.mp4
    04:06
  • 01 - Fingerprinting the OS.mp4
    03:14
  • 02 - Using Wireshark for OS discovery.mp4
    04:15
  • 03 - Employing IPv6 fingerprinting.mp4
    05:11
  • 04 - Harnessing the TTL value.mp4
    03:47
  • 05 - Mapping the network using Nmap.mp4
    04:47
  • 01 - Generating less noise.mp4
    03:17
  • 02 - Understanding the idle scan.mp4
    04:01
  • 03 - Firewalking the network.mp4
    03:07
  • 04 - Implementing stealth scans.mp4
    03:52
  • 01 - Manipulating packets.mp4
    04:29
  • 02 - Spoofing and cloaking.mp4
    03:34
  • 03 - Employing proxies.mp4
    02:09
  • 04 - Leveraging anonymizers.mp4
    02:44
  • 01 - Preventing scanning.mp4
    04:02
  • 02 - Detecting spoofing.mp4
    05:27
  • 03 - Challenge Draw a network diagram.mp4
    01:00
  • 04 - Solution Draw a network diagram.mp4
    03:35
  • 05 - Next steps.mp4
    01:18
  • Description


    After footprinting and reconnaissance, scanning is the second phase of information gathering that hackers use to size up a network. Network scans are a key tool in the arsenal of ethical hackers, who work to prevent attacks on an organizations infrastructure and data. This course investigates the scanning tools and techniques used to obtain information from a target system. Instructor Lisa Bock discusses the importance of scanning the network during an Ethical Hacking exercise. She covers host discovery methods and explains ways to identify open services and determine the OS on a host. In addition, Lisa outlines evasion techniques to use when scanning and presents anti-spoofing and scanning methods Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312_50) version 12.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Experienced author with a demonstrated history of working in the e-learning industry. She is a security ambassador with a broad range of IT skills and knowledge, including networking, CyberOps, Wireshark, biometrics, Ethical Hacking and the IoT. Lisa is an author for LinkedIn Learning, Packt Publishing and CompTIA and is an award-winning speaker who has presented at several national conferences. She holds a MS in computer information systems/information assurance from UMGC. Lisa was an associate professor in the IT department at Pennsylvania College of Technology (Williamsport, PA) from 2003 until her retirement in 2020. She is involved with various volunteer activities, and she and her husband Mike enjoy bike riding, watching movies, and traveling.
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 38
    • duration 2:15:51
    • English subtitles has
    • Release Date 2024/02/10