Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Lynda - Ethical Hacking: Scanning Networks

    Posted By: U.N.Owen
    Lynda - Ethical Hacking: Scanning Networks

    Lynda - Ethical Hacking: Scanning Networks
    Size: 302 MB | Duration: 1h 43m | Video: AVC (.mp4) 1280x720 15&30fps | Audio: AAC 48KHz 2ch
    Genre: eLearning | Level: Intermediate | Language: English

    After footprinting and reconnaissance, scanning is the second phase of information gathering that hackers use to size up a network. Scanning is where they dive deeper into the system to look for valuable data and services in a specific IP address range. Network scans are also a key tool in the arsenal of ethical hackers, who work to prevent attacks on an organization's infrastructure and data. This course investigates the scanning tools and techniques used to obtain information from a target system, including specially crafted packets, TCP flags, UDP scans, and ping sweeps. Lisa Bock discusses how hackers can identify live systems via protocols, blueprint a network, and perform a vulnerability scan to find weaknesses. She also introduces some of the tools and techniques that hackers use to counter detection via evasion, concealment, and spoofing. In addition, learn how to reduce the threat of tunneling, a method hackers use to circumvent network security. Note: Our Ethical Hacking series maps to the 18 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312_50). This course maps to the 03 Scanning Networks domain.

    * Scanning overview
    * Port scanning countermeasures
    * Scanning and querying DNS
    * Scanning with ICMP
    * Mapping (or blueprinting) a network
    * Scanning for vulnerabilities
    * Using tools such as hping and NetScan
    * Evading detection
    * Concealing your network traffic
    * Preventing tunneling


    Lynda - Ethical Hacking: Scanning Networks

    No mirrors below please.