CEH v12: Nmap TCP Scans

CEH v12    |    Intermediate
  • 4 videos | 1h 22m 33s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 3 users Rating 4.7 of 3 users (3)
When scanning a target with nmap for open ports and/or services, there are several common types of scans. In this course, you'll explore TCP Connect scans, how to issue a TCP Connect scan with nmap, and pros and cons of using this type of scan. You'll also look at Stealth and TCP scans, how to issue them with nmap, and their pros and cons. Next, you'll examine how good network security professionals employ firewalls to protect their assets and how this can hinder network-based recon activities. Finally, you'll learn about using nmap's ACK scan for the purposes of mapping possible firewall rules enumerating port states. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.

WHAT YOU WILL LEARN

  • Using nmap to perform a tcp connect scan
    describe how tcp connect scans detect open ports on a target host
    Describe the advantages of the nmap stealth scan
    identify the disadvantages of using the nmap stealth scan
    Describe inverse tcp scans and how they are done with nmap
  • troubleshoot inverse tcp scans when using nmap
    perform an inverse tcp scan using nmap
    Use nmap’s ack and time-to-live option to map possible firewall rules
    work with nmap’s ack scan to map possible firewall rules

IN THIS COURSE

  • Locked
    1.  TCP Connect Scan
    19m 25s
    After completing this video, you will be able to outline the use of TCP Connect scans, how to issue a TCP Connect scan with nmap, and the pros and cons of using this type of scan. FREE ACCESS
  • Locked
    2.  Stealth Scan
    13m 58s
    Upon completion of this video, you will be able to provide an overview of Stealth scans, how to issue a Stealth scan with nmap, and the pros and cons of using this scan type. FREE ACCESS
  • Locked
    3.  Inverse TCP XMAS and Maimon Scans
    24m 2s
    After completing this video, you will be able to outline Inverse TCP scans, how to issue an Inverse TCP scan with nmap, and the pros and cons of this scan type. FREE ACCESS
  • Locked
    4.  ACK Scan
    25m 7s
    In this video, you will learn how to use nmap's ACK scan to map possible firewall rules and enumerate port states. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.8 of 20 users Rating 4.8 of 20 users (20)
Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)