Network Discovery Tools and Techniques

Cybersecurity    |    Beginner
  • 21 Videos | 1h 2m 59s
  • Includes Assessment
  • Earns a Badge
Network discovery is the process of identifying or mapping internal networks and computer resources in an organization. Conveniently, network discovery tools can be used to automate the scanning process and discover all the devices on a specific network. In this course, you'll learn about the OSI and TCP/IP models, and how they are used to facilitate communication between entities on a network. Wxplore how security controls behave at different layers of the OSI and TCP/IP models. Explore common network devices and learn how they can be compromised physically or administratively. Discover how to differentiate between discovery, footprinting, and scanning tools, and explore categories of discovery tools including auditing, vulnerability scanning, and SNMP. Explore Nmap, Zenmap, and Supercan network discovery tools, and learn when to use protocol analyzer tools such as Wireshark. Lastly, discover the benefits of periodically referencing the Common Vulnerabilities and Exposures database.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    recall the fundamentals of the confidentiality, integrity, and availability (CIA) trial
    describe how the Open Systems Interconnection Model (OSI) model is used to facilitate the communication between entities
    list fundamentals of the TCP/IP model
    recognize how security controls behave at different layers of the OSI and TCP/IP models
    differentiate between common networking device types
    recognize how network devices can be compromised physically or administratively
    differentiate between discovery, footprinting, and scanning tools
    determine what tool restrictions are in place on a network
    list categories of discovery tools including auditing, vulnerability scanning, and SNMP
    use network discovery tools such as a network sniffer
  • provide an overview of the Internet Control Message Protocol (ICMP) protocol
    use the ping and traceroute command line tools
    identify an IP address owner using website such as IANA.org and ARIN.net
    differentiate between Nmap, Zenmap, and Supercan network discovery tools
    recognize when to use protocol analyzer tools such as Wireshark
    provide an overview of the Simple Network Management Protocol (SNMP) protocol
    differentiate between the Nessus and Retina vulnerability scanning tools
    provide an overview of the Common Vulnerabilities and Exposures database
    recognize the importance of implementing company security policies
    provide an overview of vulnerabilities and list common reasons for vulnerabilities

IN THIS COURSE