1. ▄▄▄ ▄▄▄
  2. █████▄ ▄▄▄ ▄█████
  3. ▄▄▄▄ ▀█████ ▄▄█▓█████▄▄ █████ ▄▄▄ ▄▄▄▄
  4. ▄██████████▄████▓ █████████████ ████ ▄█████ ██████
  5. ███▓▀▀▀▀█████▓████ █████▀ ▀████▓ ▓███ ▄██▄ █████▓ ▓██████
  6. ░▓███▄ ▄████ ████ █████▓ ▓█████▓███ ████ ██████▄ ▄██████▓
  7. ████████████▀ ████ █████ █████████ ████▄██▄███████▄███▀████▓
  8. ▀███▄ ▄▄▄ ▄████▀ ▓████ █████████ ████████▓███ ▀██▓▀ ████
  9. ▀███▄████▄█████ ██████ ████▓█████▄▓████ ▀▀ ████ ▀ ████
  10. ▄████▄ ▀▀████████▓ ███████ ▓▓██▀███▀ ▀██████▄██▄ ███ ████
  11. █████████ ▀█▓▀ █████▄▄ ░▓███████▄▄▄████▄██▓ ▀████████████ ████
  12. ██████████▄ ▄▄ ▀▀█████▄▄▓████▀███████▀▄███ ▄▄ ████████████ ▓▄▄▄▄ ████▓░
  13. ▓█████████████▓▓█▄▄ ▀▀▓▓█████▓░ ▀▀▀ ▄ ▀████▄ ▀██ ████████████ ████▀ ▄███▓
  14. ▀███▓▓▓█████████████▄▄▄ ▀▀███▀ ▄███████▄ ▀▀███▄ ▓ ███▓███▓████ ▓█▀ ▄███▀▀
  15. ▀▀▀ ▀▀▀▓▓███▄▄▄▄▄███████▀▀▀▀▓ ▀▀ ███▓ ▀▀ ████ ▀ ▀▓▓█▄▄
  16. ▀▀▀▀▀▀ ▀▀ ▀██▀ ▀▀▀▀▀
  17. RELEASE NAME....: Lynda.com.Ethical.Hacking.Scanning.Networks-ELOHiM
  18. RELEASE DATE....: 2016-07-12
  19. RELEASE SIZE....: 19x15Mb
  20. FORMAT..........: Bookware
  21. LANGUAGE........: English
  22. URL.............: http://www.lynda.com
  23. After footprinting and reconnaissance, scanning is the second phase of
  24. information gathering that hackers use to size up a network. Scanning is
  25. where they dive deeper into the system to look for valuable data and
  26. services in a specific IP address range. Network scans are also a key tool
  27. in the arsenal of ethical hackers, who work to prevent attacks on an
  28. organization's infrastructure and data.
  29. This course investigates the scanning tools and techniques used to obtain
  30. information from a target system, including specially crafted packets, TCP
  31. flags, UDP scans, and ping sweeps. Lisa Bock discusses how hackers can
  32. identify live systems via protocols, blueprint a network, and perform a
  33. vulnerability scan to find weaknesses. She also introduces some of the
  34. tools and techniques that hackers use to counter detection via evasion,
  35. concealment, and spoofing. In addition, learn how to reduce the threat of
  36. tunneling, a method hackers use to circumvent network security.
  37. Note: Our Ethical Hacking series maps to the 18 parts of the EC-Council
  38. Certified Ethical Hacker (CEH) exam (312_50). This course maps to the 03
  39. Scanning Networks domain.
  40. Topics include:
  41. * Scanning overview
  42. * Port scanning countermeasures
  43. * Scanning and querying DNS
  44. * Scanning with ICMP
  45. * Mapping (or blueprinting) a network
  46. * Scanning for vulnerabilities
  47. * Using tools such as hping and NetScan
  48. * Evading detection
  49. * Concealing your network traffic
  50. * Preventing tunneling
  51. Subjects: Security, IT, CEH, Certified Ethical Hacker, Linux
  52. Author: Lisa Bock
  53. Level: Intermediate
  54. Duration: 1h 43m
  55. Released: 7/11/2016