Ethical Hacker: Host Discovery & Scanning with Nmap

Ethical Hacker 10    |    Intermediate
  • 3 Videos | 1h 35m 44s
  • Includes Assessment
  • Earns a Badge
Likes 83 Likes 83
Explore tools and techniques to discover hosts and determine if a host has open ports, services, or vulnerabilities, as you prepare for the 312-50: Certified Ethical Hacker v10 exam. During this course, you will learn how to create a BASH shell to search for valid network devices. Identify utilities that discover network devices. Analyze Nmap functionality, classify Nmap scanning features, and identify commands based on the type of scan performed. Then move on to executing commands to search for open ports, runing UDP commands to scan on all ports, selecting the command that determines the device operating system, and identifying a port’s service and version.

WHAT YOU WILL LEARN

  • create a BASH shell to search for valid network devices
    identify utilities for discovering network devices
    identify commands with the type of scan being performed
    identify scanning features offered by Nmap
    identify the functionality offered by Nmap
  • identify a port’s service and version
    identify the command that determines the device operating system
    identify the command that performs UDP scans on all ports
    identify the command to search for open ports

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 19 Likes 19  
Likes 168 Likes 168  
Likes 10 Likes 10  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 168 Likes 168  
Likes 84 Likes 84