Mastering Practical Network Scanning
Course
Online
Description
-
Type
Course
-
Methodology
Online
-
Start date
Different dates available
Hands-on experience in performing network scanning using NmapNetwork scanning is the process of assessing a network to identify an active host network, which will either be an attacker or a medium for security assessment. This procedure plays an extremely vital role in risk assessment programs or when preparing a security plan for your organization.This course picks up where Learning Practical Network Scanning finished and focuses on the most widely available customization network scanning tool: Nmap. Sills learned with Nmap can be later applied to many other applications.First, it starts by understanding various methods to define scanning targets. Next, the course covers understanding (and adjusting) how ports are scanned and applications and operating systems are detected. Later, it explains how to detect and bypass firewalls and perform scripting to make common tasks easy to repeat.About the AuthorAndrew Crouthamel is an experienced Senior Network Engineer and IT trainer who resides in Doylestown, PA, and currently works with organizations such as NASA, ESA, JAXA, Boeing, and the US Air Force. His passion for teaching shows in his courses, which are filled with excitement and real-world anecdotes.
For more information about him, please refer to the following links:
Facilities
Location
Start date
Start date
About this course
Learn how various Nmap detection algorithms function
Optimize Nmap to reduce your scan times and be as efficient as possible
Bypass firewalls and trick IDS to ensure your network scans work correctly
Learn how to create scripts to automate Nmap tasks
Reviews
This centre's achievements
All courses are up to date
The average rating is higher than 3.7
More than 50 reviews in the last 12 months
This centre has featured on Emagister for 6 years
Subjects
- Network Training
- TCP
- IP
- Import
- Systems
- Operating Systems
- DNS
- Network
- Networks
- Options
Course programme
- Provide targets at the end of the command
- Specify CIDR networks, individual hosts, or ranges
- Import text file lists that were created with a prior scan or other software
- External resources can be identified with WHOIS lookups
- Specific external records can be found with DNS lookups
- Lastly, BGP AS records can be used to determine subnets owned by a company
- Use a list scan to passively detect targets
- Run a standard ping scan to determine which are up
- Disable ping when you have a known target list
- First, TCP with SYN and ACK are used
- Second, UDP and ICMP ping are used
- Lastly, ARP can be used to scan a local network
- Provide targets at the end of the command
- Specify CIDR networks, individual hosts, or ranges
- Import text file lists that were created with a prior scan or other software
- External resources can be identified with WHOIS lookups
- Specific external records can be found with DNS lookups
- Lastly, BGP AS records can be used to determine subnets owned by a company
- Use a list scan to passively detect targets
- Run a standard ping scan to determine which are up
- Disable ping when you have a known target list
- First, TCP with SYN and ACK are used
- Second, UDP and ICMP ping are used
- Lastly, ARP can be used to scan a local network
- Provide targets at the end of the command
- Specify CIDR networks, individual hosts, or ranges
- Import text file lists that were created with a prior scan or other software
- Provide targets at the end of the command
- Specify CIDR networks, individual hosts, or ranges
- Import text file lists that were created with a prior scan or other software
- Provide targets at the end of the command
- Specify CIDR networks, individual hosts, or ranges
- Import text file lists that were created with a prior scan or other software
- Provide targets at the end of the command
- Specify CIDR networks, individual hosts, or ranges
- Import text file lists that were created with a prior scan or other software
- Provide targets at the end of the command
- Specify CIDR networks, individual hosts, or ranges
- Import text file lists that were created with a prior scan or other software
- Provide targets at the end of the command
- Specify CIDR networks, individual hosts, or ranges
- Import text file lists that were created with a prior scan or other software
- External resources can be identified with WHOIS lookups
- Specific external records can be found with DNS lookups
- Lastly, BGP AS records can be used to determine subnets owned by a company
- External resources can be identified with WHOIS lookups
- Specific external records can be found with DNS lookups
- Lastly, BGP AS records can be used to determine subnets owned by a company
- External resources can be identified with WHOIS lookups
- Specific external records can be found with DNS lookups
- Lastly, BGP AS records can be used to determine subnets owned by a company
- External resources can be identified with WHOIS lookups
- Specific external records can be found with DNS lookups
- Lastly, BGP AS records can be used to determine subnets owned by a company
- External resources can be identified with WHOIS lookups
- Specific external records can be found with DNS lookups
- Lastly, BGP AS records can be used to determine subnets owned by a company
- External resources can be identified with WHOIS lookups
- Specific external records can be found with DNS lookups
- Lastly, BGP AS records can be used to determine subnets owned by a company
- Use a list scan to passively detect targets
- Run a standard ping scan to determine which are up
- Disable ping when you have a known target list
- Use a list scan to passively detect targets
- Run a standard ping scan to determine which are up
- Disable ping when you have a known target list
- Use a list scan to passively detect targets
- Run a standard ping scan to determine which are up
- Disable ping when you have a known target list
- Use a list scan to passively detect targets
- Run a standard ping scan to determine which are up
- Disable ping when you have a known target list
- Use a list scan to passively detect targets
- Run a standard ping scan to determine which are up
- Disable ping when you have a known target list
- Use a list scan to passively detect targets
- Run a standard ping scan to determine which are up
- Disable ping when you have a known target list
- First, TCP with SYN and ACK are used
- Second, UDP and ICMP ping are used
- Lastly, ARP can be used to scan a local network
- First, TCP with SYN and ACK are used
- Second, UDP and ICMP ping are used
- Lastly, ARP can be used to scan a local network
- First, TCP with SYN and ACK are used
- Second, UDP and ICMP ping are used
- Lastly, ARP can be used to scan a local network
- First, TCP with SYN and ACK are used
- Second, UDP and ICMP ping are used
- Lastly, ARP can be used to scan a local network
- First, TCP with SYN and ACK are used
- Second, UDP and ICMP ping are used
- Lastly, ARP can be used to scan a local network
- First, TCP with SYN and ACK are used
- Second, UDP and ICMP ping are used
- Lastly, ARP can be used to scan a local network
- First, TCP SYN and ACK scans can be run on ports
- Full TCP connection scans canbe run
- Lastly, TCP FIN scans can be used
- First, one can use a TCP PSH scan
- A complex idle scan can be run from a zombie machine
- The TCP window can be analyzed
- UDP scans are used, relying on ICMP unreachable errors
- UDP scans can be restricted to groups for parallelism
- IP scans can be run to determine protocol support
- Change the timing attribute to optimize timing!
- There are six timing templates to use
- The fastest ones, T4 and T5, are an order of magnitude faster than the default.
- Change the timing attribute to optimize timing!
- There are six timing templates to use
- The fastest ones, T4 and T5, are an order of magnitude faster than the default.
- Change the timing attribute to optimize timing!
- There are six timing templates to use
- The fastest ones, T4 and T5, are an order of magnitude faster than the default.
- Change the timing attribute to optimize timing!
- There are six timing templates to use
- The fastest ones, T4 and T5, are an order of magnitude faster than the default.
- Change the timing attribute to optimize timing!
- There are six timing templates to use
- The fastest ones, T4 and T5, are an order of magnitude faster than the default.
- First, Nmap sends TCP SYN and listens for service banners
- Next, it scans UDP ports and runs RPC grinders
- Lastly, it checks SSL ports and it attempts connections and scans on those
- Nmap has a large database of OS fingerprints
- These are detected by checking open and closed TCP ports
- Probes are sent, with responses recorded and compared
- First, Nmap sends TCP SYN and listens for service banners
- Next, it scans UDP ports and runs RPC grinders
- Lastly, it checks SSL ports and it attempts connections and scans on those
- Nmap has a large database of OS fingerprints
- These are detected by checking open and closed TCP ports
- Probes are sent, with responses recorded and compared
- First, Nmap sends TCP SYN and listens for service banners
- Next, it scans UDP ports and runs RPC grinders
- Lastly, it checks SSL ports and it attempts connections and scans on those
- First, Nmap sends TCP SYN and listens for service banners
- Next, it scans UDP ports and runs RPC grinders
- Lastly, it checks SSL ports and it attempts connections and scans on those
- First, Nmap sends TCP SYN and listens for service banners
- Next, it scans UDP ports and runs RPC grinders
- Lastly, it checks SSL ports and it attempts connections and scans on those
- First, Nmap sends TCP SYN and listens for service banners
- Next, it scans UDP ports and runs RPC grinders
- Lastly, it checks SSL ports and it attempts connections and scans on those
- First, Nmap sends TCP SYN and listens for service banners
- Next, it scans UDP ports and runs RPC grinders
- Lastly, it checks SSL ports and it attempts connections and scans on those
- First, Nmap...
Additional information
Mastering Practical Network Scanning
