Save for later
Ethical Hacking
Scanning Networks
Pluralsight is not an official partner or accredited training center of EC-Council. So, after reconnaissance, we need to scan for basics, kind of like knocking on all the doors to see who is home and what they look like. Then, when you find a machine that's "live", we need to get to know it really well, asking some rather personal questions like, "what OS are you running?" or "what applications are you running?" and "which ports are listening on the network?". We'll go over all you'll need to know for the exam regarding scanning, and play with some pretty fun tools along the way. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking
Get a Reminder
Rating | Not enough ratings |
---|---|
Length | 1h 53m |
Starts | On Demand (Start anytime) |
Cost | $35/month (Access to entire library- free trial available) |
From | Pluralsight |
Instructors | Lisa Bock, Dale Meredith |
Download Videos | On Windows, MacOS, iOS, and Android Pluralsight app |
Language | English |
Subjects | IT & Networking |
Tags | IT Security Linux Security Professional Network Security Ethical Hacking Cybersecurity |
Get a Reminder
Similar Courses
Careers
An overview of related careers and their average salaries in the US. Bars indicate income percentile.
Scanning Technician $43k
Radio Reconnaissance Team Member $74k
Vulnerability Scanning Engineer $79k
Database Scanning Engineer $110k
Applications Engineer/ High Definition Scanning $115k
Reconnaissance Team Leader $151k
Write a review
Your opinion matters. Tell us what you think.
Please login to leave a review
Rating | Not enough ratings |
---|---|
Length | 1h 53m |
Starts | On Demand (Start anytime) |
Cost | $35/month (Access to entire library- free trial available) |
From | Pluralsight |
Instructors | Lisa Bock, Dale Meredith |
Download Videos | On Windows, MacOS, iOS, and Android Pluralsight app |
Language | English |
Subjects | IT & Networking |
Tags | IT Security Linux Security Professional Network Security Ethical Hacking Cybersecurity |
Similar Courses
Sorted by relevance
Like this course?
Here's what to do next:
- Save this course for later
- Get more details from the course provider
- Enroll in this course