- ▄▄▄ ▄▄▄
- █████▄ ▄▄▄ ▄█████
- ▄▄▄▄ ▀█████ ▄▄█▓█████▄▄ █████ ▄▄▄ ▄▄▄▄
- ▄██████████▄████▓ █████████████ ████ ▄█████ ██████
- ███▓▀▀▀▀█████▓████ █████▀ ▀████▓ ▓███ ▄██▄ █████▓ ▓██████
- ░▓███▄ ▄████ ████ █████▓ ▓█████▓███ ████ ██████▄ ▄██████▓
- ████████████▀ ████ █████ █████████ ████▄██▄███████▄███▀████▓
- ▀███▄ ▄▄▄ ▄████▀ ▓████ █████████ ████████▓███ ▀██▓▀ ████
- ▀███▄████▄█████ ██████ ████▓█████▄▓████ ▀▀ ████ ▀ ████
- ▄████▄ ▀▀████████▓ ███████ ▓▓██▀███▀ ▀██████▄██▄ ███ ████
- █████████ ▀█▓▀ █████▄▄ ░▓███████▄▄▄████▄██▓ ▀████████████ ████
- ██████████▄ ▄▄ ▀▀█████▄▄▓████▀███████▀▄███ ▄▄ ████████████ ▓▄▄▄▄ ████▓░
- ▓█████████████▓▓█▄▄ ▀▀▓▓█████▓░ ▀▀▀ ▄ ▀████▄ ▀██ ████████████ ████▀ ▄███▓
- ▀███▓▓▓█████████████▄▄▄ ▀▀███▀ ▄███████▄ ▀▀███▄ ▓ ███▓███▓████ ▓█▀ ▄███▀▀
- ▀▀▀ ▀▀▀▓▓███▄▄▄▄▄███████▀▀▀▀▓ ▀▀ ███▓ ▀▀ ████ ▀ ▀▓▓█▄▄
- ▀▀▀▀▀▀ ▀▀ ▀██▀ ▀▀▀▀▀
- RELEASE NAME....: Lynda.com.Ethical.Hacking.Scanning.Networks-ELOHiM
- RELEASE DATE....: 2016-07-12
- RELEASE SIZE....: 19x15Mb
- FORMAT..........: Bookware
- LANGUAGE........: English
- URL.............: http://www.lynda.com
- After footprinting and reconnaissance, scanning is the second phase of
- information gathering that hackers use to size up a network. Scanning is
- where they dive deeper into the system to look for valuable data and
- services in a specific IP address range. Network scans are also a key tool
- in the arsenal of ethical hackers, who work to prevent attacks on an
- organization's infrastructure and data.
- This course investigates the scanning tools and techniques used to obtain
- information from a target system, including specially crafted packets, TCP
- flags, UDP scans, and ping sweeps. Lisa Bock discusses how hackers can
- identify live systems via protocols, blueprint a network, and perform a
- vulnerability scan to find weaknesses. She also introduces some of the
- tools and techniques that hackers use to counter detection via evasion,
- concealment, and spoofing. In addition, learn how to reduce the threat of
- tunneling, a method hackers use to circumvent network security.
- Note: Our Ethical Hacking series maps to the 18 parts of the EC-Council
- Certified Ethical Hacker (CEH) exam (312_50). This course maps to the 03
- Scanning Networks domain.
- Topics include:
- * Scanning overview
- * Port scanning countermeasures
- * Scanning and querying DNS
- * Scanning with ICMP
- * Mapping (or blueprinting) a network
- * Scanning for vulnerabilities
- * Using tools such as hping and NetScan
- * Evading detection
- * Concealing your network traffic
- * Preventing tunneling
- Subjects: Security, IT, CEH, Certified Ethical Hacker, Linux
- Author: Lisa Bock
- Level: Intermediate
- Duration: 1h 43m
- Released: 7/11/2016