Network Survey & Extraction: Network Analysis

Networking    |    Intermediate
  • 14 videos | 57m 5s
  • Includes Assessment
  • Earns a Badge
Rating 4.3 of 12 users Rating 4.3 of 12 users (12)
Knowing what devices and services are running on a network is an essential part of computer security. Being able to effectively scan a network is the first step in securing it. In this course, you'll learn how to discover and analyze networks through scanning. First, you'll explore common network scanning tools, how to identify network vulnerabilities, and how to perform reverse IP lookup. You'll then move on to learn how to identify services and operating systems, and about scanning techniques such as UDP, stealth, connect, zombie, and ARP scanning.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Recognize different tools used for network scanning
    Identify common network vulnerabilities found during scanning
    Recognize best practices for documenting physical and alternative network vulnerabilities
    Prioritize network scanning activities to maximize efficiency
    Perform reverse dns lookups on ip addresses
    Identify and enumerate services using a basic scan
  • Identify operating systems and versions using network scanning
    Perform a network discovery using udp scanning techniques
    Perform a scan using stealth methods to evade detection
    Perform tcp connect scans using nmap
    Perform an idle scan through a zombie host
    Perform arp scans to find hidden hosts on a network
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 33s
  • 3m 49s
    Upon completion of this video, you will be able to recognize different tools used for network scanning. FREE ACCESS
  • Locked
    3.  Identifying Network Vulnerabilities
    5m 30s
    In this video, find out how to identify common network vulnerabilities found during a scan. FREE ACCESS
  • Locked
    4.  Alternative Network Vulnerabilities
    3m 1s
    Upon completion of this video, you will be able to recognize best practices for documenting physical and alternative network vulnerabilities. FREE ACCESS
  • Locked
    5.  Efficient Network Scanning
    3m 30s
    In this video, you will learn how to prioritize network scanning activities to maximize efficiency. FREE ACCESS
  • Locked
    6.  Reverse IP Lookup
    4m 34s
    In this video, you will perform DNS lookups in reverse on IP addresses. FREE ACCESS
  • Locked
    7.  Identifying Services
    4m 56s
    In this video, you will learn how to identify and list services using a basic scan. FREE ACCESS
  • Locked
    8.  Operating System Identification
    6m 35s
    In this video, you will learn how to identify operating systems and versions by using network scanning. FREE ACCESS
  • Locked
    9.  UDP Scanning
    6m 18s
    During this video, you will learn how to perform a network discovery using UDP scanning techniques. FREE ACCESS
  • Locked
    10.  Stealth Scanning
    4m 41s
    In this video, learn how to perform a scan using stealth methods to avoid detection. FREE ACCESS
  • Locked
    11.  Connect Scanning
    3m 40s
    In this video, you will learn how to perform TCP connect scans using Nmap. FREE ACCESS
  • Locked
    12.  Zombie Scanning
    3m 22s
    During this video, you will learn how to perform an idle scan using a zombie host. FREE ACCESS
  • Locked
    13.  ARP Scanning
    4m 27s
    In this video, find out how to perform ARP scans to find hidden hosts on a network. FREE ACCESS
  • Locked
    14.  Course Summary
    1m 10s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 41 users Rating 4.7 of 41 users (41)
Rating 4.6 of 122 users Rating 4.6 of 122 users (122)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.7 of 31 users Rating 4.7 of 31 users (31)
Rating 4.6 of 15 users Rating 4.6 of 15 users (15)
Rating 4.7 of 60 users Rating 4.7 of 60 users (60)