Network Discovery Tools and Techniques
Cybersecurity
| Beginner
- 21 videos | 1h 1m 29s
- Includes Assessment
- Earns a Badge
Network discovery is the process of identifying or mapping internal networks and computer resources in an organization. Conveniently, network discovery tools can be used to automate the scanning process and discover all the devices on a specific network. In this course, you'll learn about the OSI and TCP/IP models, and how they are used to facilitate communication between entities on a network. Explore how security controls behave at different layers of the OSI and TCP/IP models. Explore common network devices and learn how they can be compromised physically or administratively. Discover how to differentiate between discovery, footprinting, and scanning tools, and explore categories of discovery tools including auditing, vulnerability scanning, and SNMP. Explore Nmap, Zenmap, and SuperScan network discovery tools, and learn when to use protocol analyzer tools such as Wireshark. Lastly, discover the benefits of periodically referencing the Common Vulnerabilities and Exposures database. This course was originally created by Global Knowledge (GK).
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseRecall the fundamentals of the confidentiality, integrity, and availability (cia) trialDescribe how the open systems interconnection model (osi) model is used to facilitate the communication between entitiesList fundamentals of the tcp/ip modelRecognize how security controls behave at different layers of the osi and tcp/ip modelsDifferentiate between common networking device typesRecognize how network devices can be compromised physically or administrativelyDifferentiate between discovery, footprinting, and scanning toolsDetermine what tool restrictions are in place on a networkList categories of discovery tools including auditing, vulnerability scanning, and snmpUse network discovery tools such as a network sniffer
-
Provide an overview of the internet control message protocol (icmp) protocolUse the ping and traceroute command line toolsIdentify an ip address owner using website such as iana.org and arin.netDifferentiate between nmap, zenmap, and superscan network discovery toolsRecognize when to use protocol analyzer tools such as wiresharkProvide an overview of the simple network management protocol (snmp) protocolDifferentiate between the nessus and retina vulnerability scanning toolsProvide an overview of the common vulnerabilities and exposures databaseRecognize the importance of implementing company security policiesProvide an overview of vulnerabilities and list common reasons for vulnerabilities
IN THIS COURSE
-
56s
-
1m 49s
-
4m 11s
-
2m 57s
-
5m 18s
-
1m 39s
-
3m 36s
-
1m 27s
-
48s
-
1m 53s
-
3m 24s
-
5m 39s
-
5m 38s
-
4m 57s
-
1m 38s
-
2m 54s
-
3m 26s
-
1m 58s
-
2m 35s
-
1m 36s
-
3m 12s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.