5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

Certification     EC-Council     Certified Ethical Hacker (CEH)     Certified Ethical Hacker (CEH) v11

An ethical hacker can be most effective when employing the right tools for the job. In this course, you'll learn about networking scanning types and the various flags used in TCP communication. Next, you'll explore commonly used network scanning tools used by many of today's security professionals. You'll then move on to learn about tools that can be used for host discovery, common methods of implementation, and even some countermeasures for prevention purposes. Finally, you'll examine the differences between port and service scans, their use cases, and common port/service associations. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.



Objectives

CEH v11: Network Scanning, TCP, Host Discovery & Port/Service Scanning

  • recognize the purpose of the different types of scans
  • identify the different TCP flags
  • recognize the phases of the TCP three-way handshake
  • identify scanning tools that can run on mobile devices
  • recognize scanning tools that allow you to craft custom packets
  • recognize host discovery tools that have a GUI interface
  • recognize how to perform host discovery with nmap
  • recognize the different nmap options
  • recognize how to perform a port and service scan with nmap