Ethical Hacking: Scanning Networks

Go to class
Write Review

Free Online Course: Ethical Hacking: Scanning Networks provided by LinkedIn Learning is a comprehensive online course, which lasts for 2-3 hours worth of material. The course is taught in English and is free of charge. Upon completion of the course, you can receive an e-certificate from LinkedIn Learning. Ethical Hacking: Scanning Networks is taught by Lisa Bock.

Overview
  • Become an ethical hacker. Learn how to detect network vulnerabilities through scanning, and use tools and techniques for evading IDS detection, concealing, spoofing, and tunneling.

Syllabus
  • Introduction

    • Scan the LAN
    • What you should know
    • Hacking ethically
    • Setting up your virtual network
    1. Scanning Overview and Methodology
    • Roadmapping a scan
    • Scanning techniques
    • Scanning vs. penetration testing
    • Scanning IPv6 networks
    • Port scanning countermeasures
    • Challenge: Compare pen test from a vulnerability scan
    • Solution: Compare pen test from a vulnerability scan
    2. Identifying Live Systems Using Protocols
    • The three-way handshake
    • TCP flags
    • Idle scans
    • Scan and query DNS
    • Scan using ICMP
    • Banner grabbing
    • Challenge: Using online tools for discovery
    • Solution: Using online tools for discovery
    3. Blueprint the Network
    • Map a network with Nmap
    • Passive operating system discovery
    • SSDP for discovery
    • Other network mapping tools
    4. Vulnerability Scanning
    • Scanning for vulnerabilities
    • Discovering vulnerabilities with Acunetix
    • Using commercial and free scanners
    5. Scanning Tools
    • Use hping
    • Scan with Nikto
    • Exploring NetScan Tools
    6. Evading Detection
    • Intrusion detection systems
    • Use IP fragmentation scan
    • Staying anonymous
    • Challenge: Draw a network diagram
    • Solution: Draw a network diagram
    7. Concealing and Spoofing
    • Hiding with onion routing
    • Obscuring with Proxifier and SocksChain
    • IP addresses spoofing countermeasures
    • IP spoofing detection techniques
    8. Tunneling
    • HTTP
    • SSH
    • Defend against tunneling
    Conclusion
    • Next steps