Learning Practical Network Scanning

Course

Online

£ 10 VAT inc.

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

Network scanning and port/application detection using Nessus, OpenVAS, and Nmap.Network scanning is the process of assessing a network to identify active host network, either an attacker or a medium for security assessment. This procedure plays an extremely vital role in risk assessment programs or while preparing a security plan for your organization.This course starts with the concept of network scanning and how an organization can benefit from it. Then we delve into different scanning techniques such as port and firewall detection, TCP/IP port detection, OS detection, and so on. We also implement these concepts using a few of the most prominent tools on the market such as Nmap, Nessus, and OpenVAS.By the end of this course, you will have hands-on experience in performing network scanning using different tools and choosing the best tool for your system.About the AuthorAndrew Crouthamel is an experienced Senior Network Engineer and IT trainer who lives in Doylestown, PA, and currently works with organizations such as NASA, ESA, JAXA, Boeing, and the US Air Force. His passion for teaching shows in his courses, which are filled with excitement and real-world anecdotes.
For more information about him, please refer to the following links:

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

Get an introduction to network security and why network scanning is useful
Learn about three of the most widely used scanning software packages in the industry
Identify targets and perform network scans
Determine open ports, application versions, and operating systems
Analyze reports from scanning software and determine whether there are vulnerabilities

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

This centre's achievements

2021

All courses are up to date

The average rating is higher than 3.7

More than 50 reviews in the last 12 months

This centre has featured on Emagister for 4 years

Subjects

  • Network Training
  • Financial Training
  • Engineering
  • Systems
  • Financial
  • Network
  • DSS
  • Credit

Course programme

Getting Started 6 lectures 35:21 The Course Overview This video provides an overview of the entire course. Security Landscape In this video, you will understand why security is important and what the current threats are. • Learn about increasing security incidents • Understand botnets and ransomware • Be introduced to social engineering methods Example Attacks In this video, learn what kinds of devices attackers target and what an attack looks like. • Learn about botnets and their targeting of IoT devices • See what a ransomware virus looks like • Review recent financial data attacks Laws and Standards In this video, understand laws and standards certain organizations need to adhere to in relation to security. • Keep credit card systems secure with PCI-DSS • Understand the various pieces of HIPAA • Review HIPAA safeguards Legal Issues In this video, you will determine the legal issues related to network scanning and what steps can be taken to protect yourself. • Learn what legal problems can arise from network scanning • Understand what people and organizations to contact before scanning • Implement several protections to prevent legal issues Important Resources In this video, you will be exposed to a number of resources to help learn system security and network scanning. • Visit SANS and CVE for security news • Learn security tools such as Wireshark and Nmap • Learn security tools such as OpenVAS and Nessus Getting Started 6 lectures 35:21 The Course Overview This video provides an overview of the entire course. Security Landscape In this video, you will understand why security is important and what the current threats are. • Learn about increasing security incidents • Understand botnets and ransomware • Be introduced to social engineering methods Example Attacks In this video, learn what kinds of devices attackers target and what an attack looks like. • Learn about botnets and their targeting of IoT devices • See what a ransomware virus looks like • Review recent financial data attacks Laws and Standards In this video, understand laws and standards certain organizations need to adhere to in relation to security. • Keep credit card systems secure with PCI-DSS • Understand the various pieces of HIPAA • Review HIPAA safeguards Legal Issues In this video, you will determine the legal issues related to network scanning and what steps can be taken to protect yourself. • Learn what legal problems can arise from network scanning • Understand what people and organizations to contact before scanning • Implement several protections to prevent legal issues Important Resources In this video, you will be exposed to a number of resources to help learn system security and network scanning. • Visit SANS and CVE for security news • Learn security tools such as Wireshark and Nmap • Learn security tools such as OpenVAS and Nessus The Course Overview This video provides an overview of the entire course. The Course Overview This video provides an overview of the entire course. The Course Overview This video provides an overview of the entire course. The Course Overview This video provides an overview of the entire course. This video provides an overview of the entire course. This video provides an overview of the entire course. Security Landscape In this video, you will understand why security is important and what the current threats are. • Learn about increasing security incidents • Understand botnets and ransomware • Be introduced to social engineering methods Security Landscape In this video, you will understand why security is important and what the current threats are. • Learn about increasing security incidents • Understand botnets and ransomware • Be introduced to social engineering methods Security Landscape In this video, you will understand why security is important and what the current threats are. • Learn about increasing security incidents • Understand botnets and ransomware • Be introduced to social engineering methods Security Landscape In this video, you will understand why security is important and what the current threats are. • Learn about increasing security incidents • Understand botnets and ransomware • Be introduced to social engineering methods In this video, you will understand why security is important and what the current threats are. • Learn about increasing security incidents • Understand botnets and ransomware • Be introduced to social engineering methods In this video, you will understand why security is important and what the current threats are. • Learn about increasing security incidents • Understand botnets and ransomware • Be introduced to social engineering methods Example Attacks In this video, learn what kinds of devices attackers target and what an attack looks like. • Learn about botnets and their targeting of IoT devices • See what a ransomware virus looks like • Review recent financial data attacks Example Attacks In this video, learn what kinds of devices attackers target and what an attack looks like. • Learn about botnets and their targeting of IoT devices • See what a ransomware virus looks like • Review recent financial data attacks Example Attacks In this video, learn what kinds of devices attackers target and what an attack looks like. • Learn about botnets and their targeting of IoT devices • See what a ransomware virus looks like • Review recent financial data attacks Example Attacks In this video, learn what kinds of devices attackers target and what an attack looks like. • Learn about botnets and their targeting of IoT devices • See what a ransomware virus looks like • Review recent financial data attacks In this video, learn what kinds of devices attackers target and what an attack looks like. • Learn about botnets and their targeting of IoT devices • See what a ransomware virus looks like • Review recent financial data attacks In this video, learn what kinds of devices attackers target and what an attack looks like. • Learn about botnets and their targeting of IoT devices • See what a ransomware virus looks like • Review recent financial data attacks Laws and Standards In this video, understand laws and standards certain organizations need to adhere to in relation to security. • Keep credit card systems secure with PCI-DSS • Understand the various pieces of HIPAA • Review HIPAA safeguards Laws and Standards In this video, understand laws and standards certain organizations need to adhere to in relation to security. • Keep credit card systems secure with PCI-DSS • Understand the various pieces of HIPAA • Review HIPAA safeguards Laws and Standards In this video, understand laws and standards certain organizations need to adhere to in relation to security. • Keep credit card systems secure with PCI-DSS • Understand the various pieces of HIPAA • Review HIPAA safeguards Laws and Standards In this video, understand laws and standards certain organizations need to adhere to in relation to security. • Keep credit card systems secure with PCI-DSS • Understand the various pieces of HIPAA • Review HIPAA safeguards In this video, understand laws and standards certain organizations need to adhere to in relation to security. • Keep credit card systems secure with PCI-DSS • Understand the various pieces of HIPAA • Review HIPAA safeguards In this video, understand laws and standards certain organizations need to adhere to in relation to security. • Keep credit card systems secure with PCI-DSS • Understand the various pieces of HIPAA • Review HIPAA safeguards Legal Issues In this video, you will determine the legal issues related to network scanning and what steps can be taken to protect yourself. • Learn what legal problems can arise from network scanning • Understand what people and organizations to contact before scanning • Implement several protections to prevent legal issues Legal Issues In this video, you will determine the legal issues related to network scanning and what steps can be taken to protect yourself. • Learn what legal problems can arise from network scanning • Understand what people and organizations to contact before scanning • Implement several protections to prevent legal issues Legal Issues In this video, you will determine the legal issues related to network scanning and what steps can be taken to protect yourself. • Learn what legal problems can arise from network scanning • Understand what people and organizations to contact before scanning • Implement several protections to prevent legal issues Legal Issues In this video, you will determine the legal issues related to network scanning and what steps can be taken to protect yourself. • Learn what legal problems can arise from network scanning • Understand what people and organizations to contact before scanning • Implement several protections to prevent legal issues In this video, you will determine the legal issues related to network scanning and what steps can be taken to protect yourself. • Learn what legal problems can arise from network scanning • Understand what people and organizations to contact before scanning • Implement several protections to prevent legal issues In this video, you will determine the legal issues related to network scanning and what steps can be taken to protect yourself. • Learn what legal problems can arise from network scanning • Understand what people and organizations to contact before scanning • Implement several protections to prevent legal issues Important Resources In this video, you will be exposed to a number of resources to help learn system security and network scanning. • Visit SANS and CVE for security news • Learn security tools such as Wireshark and Nmap • Learn security tools such as OpenVAS and Nessus Important Resources In this video, you will be exposed to a number of resources to help learn system security and network scanning. • Visit SANS and CVE for security news • Learn security tools such as Wireshark and Nmap • Learn security tools such as OpenVAS and Nessus Important Resources In this video, you will be exposed to a number of resources to help learn system security and network scanning. • Visit SANS and CVE for security news • Learn security tools such as Wireshark and Nmap • Learn security tools such as OpenVAS and Nessus Important Resources In this video, you will be exposed to a number of resources to help learn system security and network scanning. • Visit SANS and CVE for security news • Learn security tools such as Wireshark and Nmap • Learn security tools such as OpenVAS and Nessus In this video, you will be exposed to a number of resources to help learn system security and network scanning. • Visit SANS and CVE for security news • Learn security tools such as Wireshark and Nmap • Learn security tools such as OpenVAS and Nessus In this video, you will be exposed to a number of resources to help learn system security and network scanning. • Visit SANS and CVE for security news • Learn security tools such as Wireshark and Nmap • Learn security tools such as OpenVAS and Nessus Network Scanning 5 lectures 29:32 Host Issues In this video, you will explore methods in to ensure survivability of hosts during a network scan. • Investigate attributes of devices that can determine survivability • Learn mitigation methods to prevent host crashes • Understand adjustments that can be made to scanning software Host Discovery In this video, you will learn how hosts are discovered with scanning software. • Review the protocols used by scanning software • Investigate layer two protocols in depth • Investigate layer three protocols in depth Port Scanning In this video, you will understand how scanning software detects ports that are open on target hosts. • Review common protocols and ports • Learn how scanning software sends connection attempts • Be exposed to several port statuses Application Detection In this video, you will understand how scanning software detects applications that are open on target hosts. • Review common protocols and ports • Learn how scanning software sends connection attempts • See how applications respond and provide information OS Detection In this video, you will learn how scanning software detects operating systems that are running on target hosts. • Understand scan detection methods such as through protocol headers • Explore how scanning software sends commands to determine OS • Review what you have learned regarding scanning methods Network Scanning. 5 lectures 29:32 Host Issues In this video, you will explore methods in to ensure survivability of hosts during a network scan. • Investigate attributes of devices that can determine survivability • Learn mitigation methods to prevent host crashes • Understand adjustments that can be made to scanning software Host Discovery In this video, you will learn how hosts are discovered with scanning software. • Review the protocols used by scanning software • Investigate layer two protocols in depth • Investigate layer three protocols in depth Port Scanning In this video, you will understand how scanning software detects ports that are open on target hosts • Set enhancement configurations to extend its use • ...

Additional information

A basic understanding of cyber-security and networking is needed

Learning Practical Network Scanning

£ 10 VAT inc.