We may earn an affiliate commission when you visit our partners.
Pluralsight logo

Ethical Hacking

Scanning Networks

Dale Meredith

This course will teach you the skills attackers use for scanning and that are needed for the CEH Exam.

Read more

This course will teach you the skills attackers use for scanning and that are needed for the CEH Exam.

Knowing all the targets on a network opens possibilities for attackers. In this course, Ethical Hacking: Scanning Networks, you’ll learn how attackers get a fuller understanding of how you’ve designed your infrastructure. First, you’ll explore how to discover different hosts on a network. Next, you’ll discover how to identify the operating systems being run on said targets. Finally, you’ll learn how to bypass IDS and firewall systems. When you’re finished with this course, you’ll have the skills and knowledge of how to scan a network for targets needed for the Certified Ethical Hacking Exam.

Enroll now

What's inside

Syllabus

Course Overview
Summarizing Scanning and Its Goals
Understanding the 3-Way Handshake
Classifying the Types of Scanning
Read more
Discovering Live Hosts and Open Ports
Utilizing Banner Grabbing and OS Fingerprinting
Examining Vulnerability Scans
Building out Maps of the Network
Discovering Anonymizing Techniques
Domain Summary

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Examines scanning techniques, which is standard in CEH
Teaches attendees how to get a comprehensive understanding of network infrastructure
Develops skills needed for the CEH Exam
Builds a strong foundation for understanding scanning techniques
Provides hands-on labs and interactive materials

Save this course

Save Ethical Hacking: Scanning Networks to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Ethical Hacking: Scanning Networks. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Ethical Hacking: Scanning Networks will develop knowledge and skills that may be useful to these careers:
Penetration Tester
A penetration tester uses hacking techniques to identify security vulnerabilities in computer systems and networks. Taking this course on ethical hacking scanning networks can help you learn how to bypass IDS and firewall systems, a skill that is in high demand in this role.
Information Security Analyst
An information security analyst protects sensitive information and systems from unauthorized access, including networks, databases, servers, and applications. This course on ethical hacking scanning networks is an excellent starting point for this career because it teaches the skills for identifying vulnerabilities on a network. Taking this course may help you become more competitive in this role.
Cybersecurity Engineer
A cybersecurity engineer designs, implements, and maintains cybersecurity solutions to protect an organization's computer networks and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. Taking this course on ethical hacking scanning networks may help you learn how to identify vulnerabilities in a network, a valuable skill for this role.
Network Security Engineer
A network security engineer designs, plans, and implements security measures to protect a company's computer networks from unauthorized access, use, disclosure, disruption, modification, or destruction. Studying the ethical hacking scanning networks course will deepen your knowledge of network security and help build a foundation for this career.
Incident Responder
An incident responder investigates and responds to security breaches and other security incidents. This course on ethical hacking scanning networks can help you become more knowledgeable about network security and may help you become more competitive in this role.
Forensic Computer Analyst
A forensic computer analyst investigates computer crimes and cyberattacks. This course on ethical hacking scanning networks can help you become more knowledgeable about network security and may help you become more competitive in this role.
Network Administrator
A network administrator manages and maintains an organization's computer networks and systems. This course on ethical hacking scanning networks can help you become more knowledgeable about network security and may help you become more competitive in this role.
Security Consultant
A security consultant provides advice and guidance to organizations on how to improve their security posture. This course on ethical hacking scanning networks can help you become more knowledgeable about network security and may help you become more competitive in this role.
Cyber Threat Intelligence Analyst
A cyber threat intelligence analyst collects and analyzes information about cyber threats to help organizations protect themselves from attacks. This course on ethical hacking scanning networks can help you become more knowledgeable about network security and may help you become more competitive in this role.
Security Architect
A security architect designs and implements IT security solutions to protect an organization's information assets. This course on ethical hacking scanning networks can help you become more knowledgeable about network security and may help you become more competitive in this role.
Security Operations Center Analyst
A security operations center analyst monitors and analyzes security events to identify and mitigate threats to an organization's computer networks and systems. This course on ethical hacking scanning networks can help you become more knowledgeable about network security and may help you become more competitive in this role.
IT Auditor
An IT auditor evaluates an organization's IT systems and controls to ensure that they are secure and compliant with regulations. This course on ethical hacking scanning networks can help you become more knowledgeable about network security and may help you become more competitive in this role.
Cloud Security Engineer
A cloud security engineer designs and implements security measures to protect cloud-based applications and data from unauthorized access, use, disclosure, disruption, modification, or destruction. Taking this course on ethical hacking scanning networks can help you become more knowledgeable about network security and may help build a foundation for this role.
Cybersecurity Analyst
A cybersecurity analyst monitors and analyzes security events to identify and mitigate threats to an organization's computer networks and systems. This course on ethical hacking scanning networks can help you become more knowledgeable about network security and may help build a foundation for this role.
SOC Analyst
A SOC analyst works in a security operations center to monitor and analyze security events and incidents. This course on ethical hacking scanning networks can help you become more familiar with network security and may help prepare for this role.

Reading list

We've selected 17 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Ethical Hacking: Scanning Networks.
A detailed guide to network security assessment, covering topics such as scanning, vulnerability assessment, and penetration testing.
A comprehensive guide to advanced penetration testing techniques, including network scanning and vulnerability assessment.
A comprehensive guide to network security, with a focus on identifying and exploiting vulnerabilities in networks and systems.
A practical guide to using Metasploit for penetration testing, including network scanning and vulnerability assessment.
A detailed guide to security engineering, with a focus on building dependable distributed systems.
Provides a practical guide to using open-source tools for penetration testing, including a section on network scanning. It is suitable for those who want to learn about the tools and techniques used by professional penetration testers.
This guide is tailored to the CEH Exam and valuable asset. It supplements the course by thoroughly covering the concepts of scanning networks. While the course focuses on the practical aspects of network scanning, this guide provides a more in-depth understanding of the underlying principles.
A detailed guide to computer networks, with a focus on underlying principles and concepts.
Offers a comprehensive guide to network vulnerability assessment, including a section on scanning. It complements the course by providing a deeper understanding of the process and the tools used in vulnerability assessment.
Provides a comprehensive overview of network security assessment, including a section on network scanning. It is especially useful for those who want to gain a broader understanding of the field beyond the scope of the course.
Covers advanced penetration testing techniques, including a section on network scanning. It is suitable for experienced security professionals who want to enhance their skills in this area.
Offers advanced techniques for penetration testing. While the course focuses on the basics of network scanning, this book delves into more complex methodologies, making it suitable for those seeking to expand their knowledge.
Offers a gentle introduction to network security concepts, including a section on scanning. It is suitable for those who are new to the field or want to refresh their understanding of the basics before delving into the more advanced topics covered in the course.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Ethical Hacking: Scanning Networks.
Ethical Hacking: System Hacking
Most relevant
Ethical Hacking: Enumeration
Most relevant
Ethical Hacking: Network and Perimeter Hacking
Most relevant
Practice Your First Penetration Test: Kali & Metasploit...
Most relevant
Ethical Hacking: Sniffing
Most relevant
Ethical Hacking: Hacking IoT and OT
Most relevant
Ethical Hacking: Hacking Wireless Networks
Most relevant
Ethical Hacking: Reconnaissance/Footprinting
Most relevant
Ethical Hacking: Cryptography
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser