Network scanning and port/application detection using Nessus, OpenVAS, and Nmap.Network scanning is the process of assessing a network to identify active host network, either an attacker or a medium for security assessment. This procedure plays an extremely vital role in risk assessment programs or while preparing a security plan for your organization.This course starts with the concept of network scanning and how an organization can benefit from it. Then we delve into different scanning techniques such as port and firewall detection, TCP/IP port detection, OS detection, and so on. We also implement these concepts using a few of the most prominent tools on the market such as Nmap, Nessus, and OpenVAS.By the end of this course, you will have hands-on experience in performing network scanning using different tools and choosing the best tool for your system.About the AuthorAndrew Crouthamel is an experienced Senior Network Engineer and IT trainer who lives in Doylestown, PA, and currently works with organizations such as NASA, ESA, JAXA, Boeing, and the US Air Force. His passion for teaching shows in his courses, which are filled with excitement and real-world anecdotes.
For more information about him, please refer to the following links:
Facilities
Location
Start date
Online
Start date
Different dates availableEnrolment now open
About this course
Get an introduction to network security and why network scanning is useful
Learn about three of the most widely used scanning software packages in the industry
Identify targets and perform network scans
Determine open ports, application versions, and operating systems
Analyze reports from scanning software and determine whether there are vulnerabilities
Questions & Answers
Add your question
Our advisors and other users will be able to reply to you
We are verifying your question adjusts to our publishing rules. According to your answers, we noticed you might not be elegible to enroll into this course, possibly because of: qualification requirements, location or others. It is important you consult this with the Centre.
Thank you!
We are reviewing your question. We will publish it shortly.
Or do you prefer the center to contact you?
Reviews
Have you taken this course? Share your opinion
This centre's achievements
2021
All courses are up to date
The average rating is higher than 3.7
More than 50 reviews in the last 12 months
This centre has featured on Emagister for 4 years
Subjects
Network Training
Financial Training
Engineering
Systems
Financial
Network
DSS
Credit
Course programme
Getting Started 6 lectures35:21The Course Overview This video provides an overview of the entire course.Security Landscape In this video, you will understand why security is important and what the current threats are. • Learn about increasing security incidents • Understand botnets and ransomware • Be introduced to social engineering methodsExample Attacks In this video, learn what kinds of devices attackers target and what an attack looks like. • Learn about botnets and their targeting of IoT devices • See what a ransomware virus looks like • Review recent financial data attacksLaws and Standards In this video, understand laws and standards certain organizations need to adhere to in relation to security. • Keep credit card systems secure with PCI-DSS • Understand the various pieces of HIPAA • Review HIPAA safeguardsLegal Issues In this video, you will determine the legal issues related to network scanning and what steps can be taken to protect yourself. • Learn what legal problems can arise from network scanning • Understand what people and organizations to contact before scanning • Implement several protections to prevent legal issuesImportant Resources In this video, you will be exposed to a number of resources to help learn system security and network scanning. • Visit SANS and CVE for security news • Learn security tools such as Wireshark and Nmap • Learn security tools such as OpenVAS and Nessus Getting Started 6 lectures35:21The Course Overview This video provides an overview of the entire course.Security Landscape In this video, you will understand why security is important and what the current threats are. • Learn about increasing security incidents • Understand botnets and ransomware • Be introduced to social engineering methodsExample Attacks In this video, learn what kinds of devices attackers target and what an attack looks like. • Learn about botnets and their targeting of IoT devices • See what a ransomware virus looks like • Review recent financial data attacksLaws and Standards In this video, understand laws and standards certain organizations need to adhere to in relation to security. • Keep credit card systems secure with PCI-DSS • Understand the various pieces of HIPAA • Review HIPAA safeguardsLegal Issues In this video, you will determine the legal issues related to network scanning and what steps can be taken to protect yourself. • Learn what legal problems can arise from network scanning • Understand what people and organizations to contact before scanning • Implement several protections to prevent legal issuesImportant Resources In this video, you will be exposed to a number of resources to help learn system security and network scanning. • Visit SANS and CVE for security news • Learn security tools such as Wireshark and Nmap • Learn security tools such as OpenVAS and Nessus The Course Overview This video provides an overview of the entire course. The Course Overview This video provides an overview of the entire course. The Course Overview This video provides an overview of the entire course. The Course Overview This video provides an overview of the entire course. This video provides an overview of the entire course. This video provides an overview of the entire course. Security Landscape In this video, you will understand why security is important and what the current threats are. • Learn about increasing security incidents • Understand botnets and ransomware • Be introduced to social engineering methods Security Landscape In this video, you will understand why security is important and what the current threats are. • Learn about increasing security incidents • Understand botnets and ransomware • Be introduced to social engineering methods Security Landscape In this video, you will understand why security is important and what the current threats are. • Learn about increasing security incidents • Understand botnets and ransomware • Be introduced to social engineering methods Security Landscape In this video, you will understand why security is important and what the current threats are. • Learn about increasing security incidents • Understand botnets and ransomware • Be introduced to social engineering methods In this video, you will understand why security is important and what the current threats are. • Learn about increasing security incidents • Understand botnets and ransomware • Be introduced to social engineering methods In this video, you will understand why security is important and what the current threats are. • Learn about increasing security incidents • Understand botnets and ransomware • Be introduced to social engineering methods Example Attacks In this video, learn what kinds of devices attackers target and what an attack looks like. • Learn about botnets and their targeting of IoT devices • See what a ransomware virus looks like • Review recent financial data attacks Example Attacks In this video, learn what kinds of devices attackers target and what an attack looks like. • Learn about botnets and their targeting of IoT devices • See what a ransomware virus looks like • Review recent financial data attacks Example Attacks In this video, learn what kinds of devices attackers target and what an attack looks like. • Learn about botnets and their targeting of IoT devices • See what a ransomware virus looks like • Review recent financial data attacks Example Attacks In this video, learn what kinds of devices attackers target and what an attack looks like. • Learn about botnets and their targeting of IoT devices • See what a ransomware virus looks like • Review recent financial data attacks In this video, learn what kinds of devices attackers target and what an attack looks like. • Learn about botnets and their targeting of IoT devices • See what a ransomware virus looks like • Review recent financial data attacks In this video, learn what kinds of devices attackers target and what an attack looks like. • Learn about botnets and their targeting of IoT devices • See what a ransomware virus looks like • Review recent financial data attacks Laws and Standards In this video, understand laws and standards certain organizations need to adhere to in relation to security. • Keep credit card systems secure with PCI-DSS • Understand the various pieces of HIPAA • Review HIPAA safeguards Laws and Standards In this video, understand laws and standards certain organizations need to adhere to in relation to security. • Keep credit card systems secure with PCI-DSS • Understand the various pieces of HIPAA • Review HIPAA safeguards Laws and Standards In this video, understand laws and standards certain organizations need to adhere to in relation to security. • Keep credit card systems secure with PCI-DSS • Understand the various pieces of HIPAA • Review HIPAA safeguards Laws and Standards In this video, understand laws and standards certain organizations need to adhere to in relation to security. • Keep credit card systems secure with PCI-DSS • Understand the various pieces of HIPAA • Review HIPAA safeguards In this video, understand laws and standards certain organizations need to adhere to in relation to security. • Keep credit card systems secure with PCI-DSS • Understand the various pieces of HIPAA • Review HIPAA safeguards In this video, understand laws and standards certain organizations need to adhere to in relation to security. • Keep credit card systems secure with PCI-DSS • Understand the various pieces of HIPAA • Review HIPAA safeguards Legal Issues In this video, you will determine the legal issues related to network scanning and what steps can be taken to protect yourself. • Learn what legal problems can arise from network scanning • Understand what people and organizations to contact before scanning • Implement several protections to prevent legal issues Legal Issues In this video, you will determine the legal issues related to network scanning and what steps can be taken to protect yourself. • Learn what legal problems can arise from network scanning • Understand what people and organizations to contact before scanning • Implement several protections to prevent legal issues Legal Issues In this video, you will determine the legal issues related to network scanning and what steps can be taken to protect yourself. • Learn what legal problems can arise from network scanning • Understand what people and organizations to contact before scanning • Implement several protections to prevent legal issues Legal Issues In this video, you will determine the legal issues related to network scanning and what steps can be taken to protect yourself. • Learn what legal problems can arise from network scanning • Understand what people and organizations to contact before scanning • Implement several protections to prevent legal issues In this video, you will determine the legal issues related to network scanning and what steps can be taken to protect yourself. • Learn what legal problems can arise from network scanning • Understand what people and organizations to contact before scanning • Implement several protections to prevent legal issues In this video, you will determine the legal issues related to network scanning and what steps can be taken to protect yourself. • Learn what legal problems can arise from network scanning • Understand what people and organizations to contact before scanning • Implement several protections to prevent legal issues Important Resources In this video, you will be exposed to a number of resources to help learn system security and network scanning. • Visit SANS and CVE for security news • Learn security tools such as Wireshark and Nmap • Learn security tools such as OpenVAS and Nessus Important Resources In this video, you will be exposed to a number of resources to help learn system security and network scanning. • Visit SANS and CVE for security news • Learn security tools such as Wireshark and Nmap • Learn security tools such as OpenVAS and Nessus Important Resources In this video, you will be exposed to a number of resources to help learn system security and network scanning. • Visit SANS and CVE for security news • Learn security tools such as Wireshark and Nmap • Learn security tools such as OpenVAS and Nessus Important Resources In this video, you will be exposed to a number of resources to help learn system security and network scanning. • Visit SANS and CVE for security news • Learn security tools such as Wireshark and Nmap • Learn security tools such as OpenVAS and Nessus In this video, you will be exposed to a number of resources to help learn system security and network scanning. • Visit SANS and CVE for security news • Learn security tools such as Wireshark and Nmap • Learn security tools such as OpenVAS and Nessus In this video, you will be exposed to a number of resources to help learn system security and network scanning. • Visit SANS and CVE for security news • Learn security tools such as Wireshark and Nmap • Learn security tools such as OpenVAS and Nessus Network Scanning 5 lectures29:32Host Issues In this video, you will explore methods in to ensure survivability of hosts during a network scan. • Investigate attributes of devices that can determine survivability • Learn mitigation methods to prevent host crashes • Understand adjustments that can be made to scanning softwareHost Discovery In this video, you will learn how hosts are discovered with scanning software. • Review the protocols used by scanning software • Investigate layer two protocols in depth • Investigate layer three protocols in depthPort Scanning In this video, you will understand how scanning software detects ports that are open on target hosts. • Review common protocols and ports • Learn how scanning software sends connection attempts • Be exposed to several port statusesApplication Detection In this video, you will understand how scanning software detects applications that are open on target hosts. • Review common protocols and ports • Learn how scanning software sends connection attempts • See how applications respond and provide informationOS Detection In this video, you will learn how scanning software detects operating systems that are running on target hosts. • Understand scan detection methods such as through protocol headers • Explore how scanning software sends commands to determine OS • Review what you have learned regarding scanning methods Network Scanning. 5 lectures29:32Host Issues In this video, you will explore methods in to ensure survivability of hosts during a network scan. • Investigate attributes of devices that can determine survivability • Learn mitigation methods to prevent host crashes • Understand adjustments that can be made to scanning softwareHost Discovery In this video, you will learn how hosts are discovered with scanning software. • Review the protocols used by scanning software • Investigate layer two protocols in depth • Investigate layer three protocols in depthPort Scanning In this video, you will understand how scanning software detects ports that are open on target hosts • Set enhancement configurations to extend its use • ...
Additional information
A basic understanding of cyber-security and networking is needed