Christopher Govender
Skillsoft issued completion badges are earned based on viewing the percentage required or receiving a passing score when assessment is required. When scanning a target with nmap for open ports and/or services, there are several common types of scans.
In this course, you'll explore TCP Connect scans, how to issue a TCP Connect scan with nmap, and pros and cons of using this type of scan. You'll also look at Stealth and TCP scans, how to issue them with nmap, and their pros and cons. Next, you'll examine how good network security professionals employ firewalls to protect their assets and how this can hinder network-based recon activities. Finally, you'll learn about using nmap's ACK scan for the purposes of mapping possible firewall rules enumerating port states.
This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.
Issued on
November 12, 2024
Expires on
Does not expire