CEH v11: Nmap TCP Scans
Ethical Hacker v11 | Intermediate
- 4 Videos | 51m
- Includes Assessment
- Earns a Badge
When scanning a target with Nmap for open ports and/or services, there are several common types of scans. In this course, you'll explore TCP Connect scans, how to issue a TCP Connect scan with Nmap, and pros and cons of using this type of scan. You'll also look at Stealth and TCP scans, how to issue them with Nmap, and their pros and cons. Next, you'll examine how good network security professionals employ firewalls to protect their assets and how this can hinder network-based recon activities. Finally, you'll learn about using Nmap's ACK scan for the purposes of mapping possible firewall rules enumerating port states. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.
WHAT YOU WILL LEARN
describe how TCP Connect scans detect open ports on a target hostusing nmap to perform a TCP Connect scandescribe the advantages of the nmap Stealth scanidentify the disadvantages of using the nmap Stealth scandescribe Inverse TCP Scans and how they are done with nmap
perform an inverse TCP scan using nmaptroubleshoot Inverse TCP Scans when using nmapuse nmap’s ACK and Time-to-Live option to map possible firewall ruleswork with nmap’s ACK scan to map possible firewall rules
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.