وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Ethical Hacking: Scanning Networks

سرفصل های دوره

After footprinting and reconnaissance, scanning is the second phase of information gathering that hackers use to size up a network. Network scans are a key tool in the arsenal of ethical hackers, who work to prevent attacks on an organizations infrastructure and data. This course investigates the scanning tools and techniques used to obtain information from a target system. Instructor Lisa Bock discusses the importance of scanning the network during an Ethical Hacking exercise. She covers host discovery methods and explains ways to identify open services and determine the OS on a host. In addition, Lisa outlines evasion techniques to use when scanning and presents anti-spoofing and scanning methods Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312_50) version 12.


01 - Introduction
  • 01 - Scanning the LAN
  • 02 - Discovering resources
  • 03 - Hacking ethically
  • 04 - Setting up your virtual network

  • 02 - 1. Scanning Purpose and Methodology
  • 01 - Roadmapping a scan
  • 02 - Outlining the TCP flags
  • 03 - Leveraging the TCP three-way handshake
  • 04 - Summarizing scanning tools
  • 05 - Discovering Nmap
  • 06 - Using hping3

  • 03 - 2. Discovering Hosts
  • 01 - Locating network hosts
  • 02 - Comparing ping scans
  • 03 - Sending SYN and ACK scans
  • 04 - Challenge Identify a scanning signature
  • 05 - Solution Identify a scanning signature

  • 04 - 3. Identifying Open Services
  • 01 - Evaluating port scanning methods
  • 02 - Scanning IPv6 networks
  • 03 - Identifying listening hosts using SCTP
  • 04 - Using SSDP for discovery
  • 05 - Optimizing scans with Nmap Script Engine

  • 05 - 4. Determining Operating Systems
  • 01 - Fingerprinting the OS
  • 02 - Using Wireshark for OS discovery
  • 03 - Employing IPv6 fingerprinting
  • 04 - Harnessing the TTL value
  • 05 - Mapping the network using Nmap

  • 06 - 5. Moving through the Network
  • 01 - Generating less noise
  • 02 - Understanding the idle scan
  • 03 - Firewalking the network
  • 04 - Implementing stealth scans

  • 07 - 6. Avoiding Detection
  • 01 - Manipulating packets
  • 02 - Spoofing and cloaking
  • 03 - Employing proxies
  • 04 - Leveraging anonymizers

  • 08 - 7. Counteracting Scanning
  • 01 - Preventing scanning
  • 02 - Detecting spoofing
  • 03 - Challenge Draw a network diagram
  • 04 - Solution Draw a network diagram
  • 05 - Next steps
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 30483
    حجم: 261 مگابایت
    مدت زمان: 136 دقیقه
    تاریخ انتشار: 2 اسفند 1402
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید