We may earn an affiliate commission when you visit our partners.
Dale Meredith

This course will teach you the skills attackers use for scanning and that are needed for the CEH Exam.

Read more

This course will teach you the skills attackers use for scanning and that are needed for the CEH Exam.

Knowing all the targets on a network opens possibilities for attackers. In this course, Ethical Hacking: Scanning Networks, you’ll learn how attackers get a fuller understanding of how you’ve designed your infrastructure. First, you’ll explore how to discover different hosts on a network. Next, you’ll discover how to identify the operating systems being run on said targets. Finally, you’ll learn how to bypass IDS and firewall systems. When you’re finished with this course, you’ll have the skills and knowledge of how to scan a network for targets needed for the Certified Ethical Hacking Exam.

Enroll now

What's inside

Syllabus

Course Overview
Summarizing Scanning and Its Goals
Understanding the 3-Way Handshake
Classifying the Types of Scanning
Read more
Discovering Live Hosts and Open Ports
Utilizing Banner Grabbing and OS Fingerprinting
Examining Vulnerability Scans
Building out Maps of the Network
Discovering Anonymizing Techniques
Domain Summary

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Examines scanning techniques, which is standard in CEH
Teaches attendees how to get a comprehensive understanding of network infrastructure
Develops skills needed for the CEH Exam
Builds a strong foundation for understanding scanning techniques
Provides hands-on labs and interactive materials

Save this course

Save Ethical Hacking: Scanning Networks to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Ethical Hacking: Scanning Networks with these activities:
Network Scanning Tools Collection
Gather and organize resources on network scanning tools, including descriptions, tutorials, and best practices.
Browse courses on Networking
Show steps
  • Research and identify reliable sources for information on scanning tools.
  • Compile a list of tools along with their descriptions, features, and limitations.
  • Organize the tools into categories or subtopics for easy reference.
Connect with Security Professionals
Establish connections with experienced security professionals for guidance and mentorship in ethical hacking and network scanning.
Browse courses on Ethical Hacking
Show steps
  • Attend industry events or join online communities.
  • Reach out to professionals on platforms like LinkedIn or Twitter.
  • Request informational interviews or mentorship opportunities.
Scanning Techniques Discussion Group
Engage in peer discussions to exchange knowledge, techniques, and experiences related to network scanning.
Browse courses on Networking
Show steps
  • Join or create a study group or online forum.
  • Participate in discussions, ask questions, and share insights.
  • Collaborate with peers on scanning projects or exercises.
Four other activities
Expand to see all activities and additional details
Show all seven activities
Banner Grabbing Practice
Practice banner grabbing techniques to identify the operating systems running on target hosts.
Show steps
  • Set up a network environment with multiple hosts.
  • Use tools such as nmap or netcat to send requests to the hosts.
  • Analyze the responses to identify the operating systems.
OS Fingerprinting Exercises
Conduct hands-on exercises to develop proficiency in identifying operating systems through fingerprinting.
Show steps
  • Set up a lab environment with different operating systems.
  • Use tools like nmap or OSINT Framework to gather information.
  • Analyze the collected data to determine the operating systems.
Network Scanning Tutorial Video
Create a video tutorial that demonstrates the key concepts and techniques of network scanning in a clear and engaging way.
Browse courses on Networking
Show steps
  • Plan the content and outline the steps.
  • Record the tutorial using tools like OBS or Screencastify.
  • Edit the video, adding visuals and narration.
  • Share the tutorial on platforms like YouTube or LinkedIn Learning.
Network Vulnerability Assessment Report
Create a comprehensive report on potential vulnerabilities identified during network scanning.
Browse courses on Vulnerability Assessment
Show steps
  • Conduct a thorough network scan using vulnerability assessment tools.
  • Document the vulnerabilities found, including details such as severity and impact.
  • Recommend mitigation strategies for each vulnerability.
  • Present the report to stakeholders or team members.

Career center

Learners who complete Ethical Hacking: Scanning Networks will develop knowledge and skills that may be useful to these careers:
Penetration Tester
A penetration tester uses hacking techniques to identify security vulnerabilities in computer systems and networks. Taking this course on ethical hacking scanning networks can help you learn how to bypass IDS and firewall systems, a skill that is in high demand in this role.
Information Security Analyst
An information security analyst protects sensitive information and systems from unauthorized access, including networks, databases, servers, and applications. This course on ethical hacking scanning networks is an excellent starting point for this career because it teaches the skills for identifying vulnerabilities on a network. Taking this course may help you become more competitive in this role.
Cybersecurity Engineer
A cybersecurity engineer designs, implements, and maintains cybersecurity solutions to protect an organization's computer networks and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. Taking this course on ethical hacking scanning networks may help you learn how to identify vulnerabilities in a network, a valuable skill for this role.
Network Security Engineer
A network security engineer designs, plans, and implements security measures to protect a company's computer networks from unauthorized access, use, disclosure, disruption, modification, or destruction. Studying the ethical hacking scanning networks course will deepen your knowledge of network security and help build a foundation for this career.
Incident Responder
An incident responder investigates and responds to security breaches and other security incidents. This course on ethical hacking scanning networks can help you become more knowledgeable about network security and may help you become more competitive in this role.
Forensic Computer Analyst
A forensic computer analyst investigates computer crimes and cyberattacks. This course on ethical hacking scanning networks can help you become more knowledgeable about network security and may help you become more competitive in this role.
Network Administrator
A network administrator manages and maintains an organization's computer networks and systems. This course on ethical hacking scanning networks can help you become more knowledgeable about network security and may help you become more competitive in this role.
Security Consultant
A security consultant provides advice and guidance to organizations on how to improve their security posture. This course on ethical hacking scanning networks can help you become more knowledgeable about network security and may help you become more competitive in this role.
Cyber Threat Intelligence Analyst
A cyber threat intelligence analyst collects and analyzes information about cyber threats to help organizations protect themselves from attacks. This course on ethical hacking scanning networks can help you become more knowledgeable about network security and may help you become more competitive in this role.
Security Architect
A security architect designs and implements IT security solutions to protect an organization's information assets. This course on ethical hacking scanning networks can help you become more knowledgeable about network security and may help you become more competitive in this role.
Security Operations Center Analyst
A security operations center analyst monitors and analyzes security events to identify and mitigate threats to an organization's computer networks and systems. This course on ethical hacking scanning networks can help you become more knowledgeable about network security and may help you become more competitive in this role.
IT Auditor
An IT auditor evaluates an organization's IT systems and controls to ensure that they are secure and compliant with regulations. This course on ethical hacking scanning networks can help you become more knowledgeable about network security and may help you become more competitive in this role.
Cloud Security Engineer
A cloud security engineer designs and implements security measures to protect cloud-based applications and data from unauthorized access, use, disclosure, disruption, modification, or destruction. Taking this course on ethical hacking scanning networks can help you become more knowledgeable about network security and may help build a foundation for this role.
Cybersecurity Analyst
A cybersecurity analyst monitors and analyzes security events to identify and mitigate threats to an organization's computer networks and systems. This course on ethical hacking scanning networks can help you become more knowledgeable about network security and may help build a foundation for this role.
SOC Analyst
A SOC analyst works in a security operations center to monitor and analyze security events and incidents. This course on ethical hacking scanning networks can help you become more familiar with network security and may help prepare for this role.

Reading list

We've selected 17 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Ethical Hacking: Scanning Networks.
A detailed guide to network security assessment, covering topics such as scanning, vulnerability assessment, and penetration testing.
A comprehensive guide to advanced penetration testing techniques, including network scanning and vulnerability assessment.
A comprehensive guide to network security, with a focus on identifying and exploiting vulnerabilities in networks and systems.
A practical guide to using Metasploit for penetration testing, including network scanning and vulnerability assessment.
A detailed guide to security engineering, with a focus on building dependable distributed systems.
Provides a practical guide to using open-source tools for penetration testing, including a section on network scanning. It is suitable for those who want to learn about the tools and techniques used by professional penetration testers.
This guide is tailored to the CEH Exam and valuable asset. It supplements the course by thoroughly covering the concepts of scanning networks. While the course focuses on the practical aspects of network scanning, this guide provides a more in-depth understanding of the underlying principles.
A detailed guide to computer networks, with a focus on underlying principles and concepts.
Offers a comprehensive guide to network vulnerability assessment, including a section on scanning. It complements the course by providing a deeper understanding of the process and the tools used in vulnerability assessment.
Provides a comprehensive overview of network security assessment, including a section on network scanning. It is especially useful for those who want to gain a broader understanding of the field beyond the scope of the course.
Covers advanced penetration testing techniques, including a section on network scanning. It is suitable for experienced security professionals who want to enhance their skills in this area.
Offers advanced techniques for penetration testing. While the course focuses on the basics of network scanning, this book delves into more complex methodologies, making it suitable for those seeking to expand their knowledge.
Offers a gentle introduction to network security concepts, including a section on scanning. It is suitable for those who are new to the field or want to refresh their understanding of the basics before delving into the more advanced topics covered in the course.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Ethical Hacking: Scanning Networks.
Ethical Hacking: System Hacking
Most relevant
Ethical Hacking: Enumeration
Most relevant
Ethical Hacking: Network and Perimeter Hacking
Most relevant
Practice Your First Penetration Test: Kali & Metasploit...
Most relevant
Ethical Hacking: Sniffing
Most relevant
Ethical Hacking: Hacking IoT and OT
Most relevant
Ethical Hacking: Hacking Wireless Networks
Most relevant
Ethical Hacking: Reconnaissance/Footprinting
Most relevant
Ethical Hacking: Cryptography
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser