Ethical Hacker: Host Discovery & Scanning with Nmap

Ethical Hacker 10    |    Intermediate
  • 3 videos | 1h 31m 14s
  • Includes Assessment
  • Earns a Badge
Rating 4.8 of 31 users Rating 4.8 of 31 users (31)
Explore tools and techniques to discover hosts and determine if a host has open ports, services, or vulnerabilities, as you prepare for the 312-50: Certified Ethical Hacker v10 exam. During this course, you will learn how to create a BASH shell to search for valid network devices. Identify utilities that discover network devices. Analyze Nmap functionality, classify Nmap scanning features, and identify commands based on the type of scan performed. Then move on to executing commands to search for open ports, runing UDP commands to scan on all ports, selecting the command that determines the device operating system, and identifying a port's service and version.

WHAT YOU WILL LEARN

  • Create a bash shell to search for valid network devices
    identify utilities for discovering network devices
    Identify the functionality offered by nmap
    identify scanning features offered by nmap
    identify commands with the type of scan being performed
  • Identify the command to search for open ports
    identify the command that performs udp scans on all ports
    identify a port’s service and version
    identify the command that determines the device operating system

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 3 users Rating 4.7 of 3 users (3)
Rating 4.6 of 20 users Rating 4.6 of 20 users (20)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 21 users Rating 4.5 of 21 users (21)
Rating 4.8 of 41 users Rating 4.8 of 41 users (41)
Rating 4.6 of 153 users Rating 4.6 of 153 users (153)