CEH v12: Scan Optimization, OS Identification, and IDS/Firewall Evasion

CEH v12    |    Intermediate
  • 3 videos | 55m 9s
  • Includes Assessment
  • Earns a Badge
Running nmap scans can sometimes take a lot of time. In this course, you'll explore a few options and techniques for decreasing the amount of time you wait for nmap to complete its scans. Knowing what operating system your target is running sets the stage for how you'll conduct the subsequent steps of your hacking methodology, so you'll also examine common tools and techniques for discovering a target's host OS. Finally, you'll learn about tactics and tools that can be used to help you evade common network security controls such as firewalls and intrusion detection systems (IDS). This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.

WHAT YOU WILL LEARN

  • Recognize nmap options and techniques to decrease the waiting time for scans
    define the nmap timing template options for increasing or decreasing the time nmap takes to perform a scan
    Describe how nmap can be used to detect a targets operating system
    recognize techniques that can be used to determine a targets operating system
  • Use evasion tactics and tools to obfuscate network scans
    recognize evasion techniques and tactics to help evade firewalls and ids
    recognize tactics to evade common network security controls
    describe nmap features to bypass firewall and ids alerting

IN THIS COURSE

  • Locked
    1.  Nmap Scan Optimizations
    12m 24s
    Upon completion of this video, you will be able to recognize options and techniques for decreasing the amount of time it takes for nmap to complete its scans. FREE ACCESS
  • Locked
    2.  Target OS Identification Techniques
    17m 58s
    After completing this video, you will be able to identify common tools and techniques used to discover a target's host OS. FREE ACCESS
  • Locked
    3.  Intrusion Detection System (IDS) and Firewall Evasion
    24m 48s
    Upon completion of this video, you will be able to identify tactics and tools that can be used to evade common network security controls such as firewalls and intrusion detection systems (IDS). FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE