Ethical Hacker: Scanning

IT Security    |    Intermediate
  • 10 videos | 36m 41s
  • Includes Assessment
Rating 4.7 of 53 users Rating 4.7 of 53 users (53)
One of the early stages in ethical hacking is reconnaissance of the target. In this 10-video course, you can explore various scanning tools and techniques used in ethical hacking, including Nmap, OWASP ZAP, Vega, Shodan, and specialized Google searches. Key concepts covered in this course include how to use Nmap, an open-source network scanner and one of the most widely-used scanning tools for scanning a target system or network; how to use OWASP ZAP, an open-source web application security scanner, to scan a target website; and how to use Vega, an open-source web security scanner and testing platform, to scan a target website. Next, learners observe how to use the Shodan search engine to gather information about vulnerabilities, its purpose and usage, and the role it plays in ethical hacking and penetration testing. Finally, learn how to use multiple informational websites to gain information about a target; and apply specialized advanced Google searches to find information for ethical hacking.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe nmap and how it can be used
    Use nmap to scan a target system or network
    Use owasp zap to scan a target web site
    Use vega to scan a target web site
  • Describe the shodan search engine, its purpose and usage, and the role it plays in ethical hacking and penetration testing
    Use shodan to gather information about vulnerabilities
    Use multiple informational web sites to gain information about a target
    Apply specialized google searches to find information for ethical hacking
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 20s
  • 6m 16s
    Upon completion of this video, you will be able to describe NMAP and how to use it. FREE ACCESS
  • Locked
    3.  Using NMAP
    5m 3s
    To find out how to use NMAP to scan a target system or network, consult the NMAP documentation. FREE ACCESS
  • Locked
    4.  Using OWASP ZAP
    3m 54s
    Learn how to use OWASP ZAP to scan a target website. FREE ACCESS
  • Locked
    5.  Using Vega
    3m 47s
    In this video, you will use Vega to scan a target website. FREE ACCESS
  • Locked
    6.  Shodan Search Engine
    2m 46s
    After completing this video, you will be able to describe the Shodan search engine, its purpose and usage, and the role it plays in ethical hacking and penetration testing. FREE ACCESS
  • Locked
    7.  Using Shodan
    5m 5s
    In this video, you will use Shodan to gather information about vulnerabilities. FREE ACCESS
  • Locked
    8.  Using Information Web Sites
    4m 38s
    Learn how to use multiple informational websites to gain information about a target. FREE ACCESS
  • Locked
    9.  Performing Google Searches
    3m 2s
    In this video, find out how to apply specialized Google searches to find information for ethical hacking. FREE ACCESS
  • Locked
    10.  Course Summary
    50s

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 106 users Rating 4.4 of 106 users (106)
Rating 4.6 of 1111 users Rating 4.6 of 1111 users (1111)
Rating 4.7 of 16 users Rating 4.7 of 16 users (16)