Network Discovery Tools and Techniques
Cybersecurity
| Beginner
- 21 Videos | 1h 1m 29s
- Includes Assessment
- Earns a Badge
Network discovery is the process of identifying or mapping internal networks and computer resources in an organization. Conveniently, network discovery tools can be used to automate the scanning process and discover all the devices on a specific network. In this course, you'll learn about the OSI and TCP/IP models, and how they are used to facilitate communication between entities on a network. Explore how security controls behave at different layers of the OSI and TCP/IP models. Explore common network devices and learn how they can be compromised physically or administratively. Discover how to differentiate between discovery, footprinting, and scanning tools, and explore categories of discovery tools including auditing, vulnerability scanning, and SNMP. Explore Nmap, Zenmap, and SuperScan network discovery tools, and learn when to use protocol analyzer tools such as Wireshark. Lastly, discover the benefits of periodically referencing the Common Vulnerabilities and Exposures database. This course was originally created by Global Knowledge (GK).
WHAT YOU WILL LEARN
-
discover the key concepts covered in this courserecall the fundamentals of the confidentiality, integrity, and availability (CIA) trialdescribe how the Open Systems Interconnection Model (OSI) model is used to facilitate the communication between entitieslist fundamentals of the TCP/IP modelrecognize how security controls behave at different layers of the OSI and TCP/IP modelsdifferentiate between common networking device typesrecognize how network devices can be compromised physically or administrativelydifferentiate between discovery, footprinting, and scanning toolsdetermine what tool restrictions are in place on a networklist categories of discovery tools including auditing, vulnerability scanning, and SNMPuse network discovery tools such as a network sniffer
-
provide an overview of the Internet Control Message Protocol (ICMP) protocoluse the ping and traceroute command line toolsidentify an IP address owner using website such as IANA.org and ARIN.netdifferentiate between Nmap, Zenmap, and SuperScan network discovery toolsrecognize when to use protocol analyzer tools such as Wiresharkprovide an overview of the Simple Network Management Protocol (SNMP) protocoldifferentiate between the Nessus and Retina vulnerability scanning toolsprovide an overview of the Common Vulnerabilities and Exposures databaserecognize the importance of implementing company security policiesprovide an overview of vulnerabilities and list common reasons for vulnerabilities
IN THIS COURSE
-
1.Introduction to Network Discovery56sUP NEXT
-
2.Networking Review1m 49s
-
3.Open Systems Interconnection Model4m 11s
-
4.TCP/IP Model2m 57s
-
5.Security Controls Behavior5m 18s
-
6.Network Device Types1m 39s
-
7.Compromised Access3m 36s
-
8.Discovery, Footprinting, and Scanning1m 27s
-
9.Tool Restrictions48s
-
10.Discovery Tools1m 53s
-
11.Working with Network Discovery Tools3m 24s
-
12.Internet Control Message Protocol5m 39s
-
13.Ping and Traceroute5m 38s
-
14.Identifying an IP Address Owner4m 57s
-
15.Nmap, Zenmap, and SuperScan1m 38s
-
16.Protocol Analyzers2m 54s
-
17.Simple Network Management Protocol3m 26s
-
18.Nessus/Retina1m 58s
-
19.Common Vulnerabilities and Exposures2m 35s
-
20.Security Policies1m 36s
-
21.Vulnerabilities3m 12s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.