5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Skills     Security     Security Accreditations and Best Practice     Certified Ethical Hacker (CEH) v10
Explore tools and techniques to discover hosts and determine if a host has open ports, services, or vulnerabilities, as you prepare for the 312-50: Certified Ethical Hacker v10 exam. During this course, you will learn how to create a BASH shell to search for valid network devices. Identify utilities that discover network devices. Analyze Nmap functionality, classify Nmap scanning features, and identify commands based on the type of scan performed. Then move on to executing commands to search for open ports, runing UDP commands to scan on all ports, selecting the command that determines the device operating system, and identifying a port’s service and version.

Objectives

Certified Ethical Hacker - CEHv10: Host Discovery and Scanning with Nmap

  • create a BASH shell to search for valid network devices
  • identify utilities for discovering network devices
  • identify commands with the type of scan being performed
  • identify scanning features offered by Nmap
  • identify the functionality offered by Nmap
  • identify a port’s service and version
  • identify the command that determines the device operating system
  • identify the command that performs UDP scans on all ports
  • identify the command to search for open ports