5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Professional Certifications     EC Council     Certified Ethical hacker     Certified Ethical Hacker (CEH) v11

Running Nmap scans can sometimes take a lot of time. In this course, you'll explore a few options and techniques for decreasing the amount of time you wait for Nmap to complete its scans. Knowing what operating system your target is running sets the stage for how you'll conduct the subsequent steps of your hacking methodology, so you'll also examine common tools and techniques for discovering a target's host OS. Finally, you'll learn about tactics and tools that can be used to help you evade common network security controls such as firewalls and IDS. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.



Objectives

CEH v11: Scan Optimization, OS Identification & IDS/Firewall Evasion

  • define the nmap timing template options for increasing or decreasing the time nmap takes to perform a scan
  • recognize nmap options and techniques to decrease the waiting time for scans
  • describe how nmap can be used to detect a targets operating system
  • recognize techniques that can be used to determine a targets operating system
  • describe nmap features to bypass firewall and IDS alerting
  • recognize evasion techniques and tactics to help evade firewalls and IDS
  • recognize tactics to evade common network security controls
  • use evasion tactics and tools to obfuscate network scans