Ethical Hacking: Scanning Networks Preview

Ethical Hacking: Scanning Networks

With Lisa Bock Liked by 22 users
Duration: 2h 15m Skill level: Intermediate Released: 12/15/2023

Start my 1-month free trial

Course details

After footprinting and reconnaissance, scanning is the second phase of information gathering that hackers use to size up a network. Network scans are a key tool in the arsenal of ethical hackers, who work to prevent attacks on an organizations infrastructure and data. This course investigates the scanning tools and techniques used to obtain information from a target system. Instructor Lisa Bock discusses the importance of scanning the network during an Ethical Hacking exercise. She covers host discovery methods and explains ways to identify open services and determine the OS on a host. In addition, Lisa outlines evasion techniques to use when scanning and presents anti-spoofing and scanning methods Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312_50) version 12.

Skills you’ll gain

Earn a sharable certificate

Share what you’ve learned, and be a standout professional in your desired industry with a certificate showcasing your knowledge gained from the course.

Sample certificate

Certificate of Completion

  • Showcase on your LinkedIn profile under “Licenses and Certificate” section

  • Download or print out as PDF to share with others

  • Share as image online to demonstrate your skill

Meet the instructor

Learner reviews

4.9 out of 5

16 ratings
  • 5 star
    Current value: 15 93%
  • 4 star
    Current value: 1 6%
  • 3 star
    Current value: 0 0%
  • 2 star
    Current value: 0 0%
  • 1 star
    Current value: 0 0%

Contents

What’s included

  • Practice while you learn 1 exercise file
  • Test your knowledge 7 quizzes
  • Learn on the go Access on tablet and phone

Similar courses

Download courses

Use your iOS or Android LinkedIn Learning app, and watch courses on your mobile device without an internet connection.