CEH v12: Network Scanning, TCP, Host Discovery, and Port/Service Scanning
Christopher Govender
Skillsoft issued completion badges are earned based on viewing the percentage required or receiving a passing score when assessment is required. An ethical hacker can be most effective when employing the right tools for the job.
In this course, you'll learn about networking scanning types and the various flags used in TCP communication. Next, you'll explore commonly used network scanning tools used by many of today's security professionals. You'll then move on to learn about tools that can be used for host discovery, common methods of implementation, and even some countermeasures for prevention purposes. Finally, you'll examine the differences between port and service scans, their use cases, and common port/service associations.
This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.
Issued on
November 10, 2024
Expires on
Does not expire