Course Content

Module 1: Introduction

07:09
1.1 Scanning & Enumeration Introduction

Module 2: Check for Live Systems & Ports

07:06
2.1 Checking for Live Systems Lab Part 1
07:07
2.2 Checking for Live Systems Lab Part 2
06:35
2.3 Checking for Open Ports Lab Part 1
03:58
2.4 Checking for Open Ports Lab Part 2
20:00:00
2.5 Certified Ethical Hacker (CEH)

Module 3: Scanning

04:18
3.1 Scanning Part 1
03:59
3.2 Scanning with with NMAP Half Connect Scan
02:11
3.3 Scanning with NMAP Full Connect Scan
03:31
3.4 Scanning with XMAS Scan Part 1
04:21
3.5 Scanning with XMAS Scan Part 2
03:06
3.6 Scanning with NMAP ACK Scan
04:12
3.7 Scanning with NMAP ACK Scan and Windows Firewall
05:05
3.8 Scanning with hping3 and SYN Scan
03:40
3.9 Scanning with hping3 and ACK Scan
05:26
3.10 Scanning with hping3 and XMAS Scan
05:05
3.11 Scanning with hping3, ACK Scan, and Windows Firewall

Module 4: Fingerprinting & Banner Grabbing

07:56
4.1 OS Fingerprinting
08:14
4.2 Banner Grabbing

Module 5: Enumeration Tools

09:21
5.1 Zenmap
06:42
5.2 Dig and Finger Commands

Module 6: Vulnerabilities

07:02
6.1 Vulnerability Scanner Setup and Configuration of Core Impact Part 1
06:32
6.2 Vulnerability Scanner Setup and Configuration of Core Impact Part 2
01:00:00
6.3 Vulnerability Scanner Set-up and Configuration
06:54
6.4 Vulnerability Scanner Setup and Configuration of OpenVAS Part 1
09:57
6.5 Vulnerability Scanner Setup and Configuration of OpenVAS Part 2
01:00:00
6.6 Vulnerability Scanner Set-up and Configuration, Pt. 2

Module 7: Conclusion

02:08
7.1 Vulnerability Scan Assessment Overview
01:00:00
7.2 Vulnerability Scan
02:35
7.3 Scanning, Enumerations, & Vulnerabilities Conclusion

Course Description

Attackers use scanning and enumeration to determine what live systems are on the network (host discovery) and additional information about those systems, like the operating system in use and software version. With vulnerability scanning, an attacker attempts to locate specific weaknesses in system software. Specifically, the attacker is hoping to find known vulnerabilities (CVE) that they can easily exploit. This course is designed to be predominantly hands-on and covers the theory of scanning, enumeration, and vulnerabilities at a high-level.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor

Provided By

Cybrary Logo

Course Components

On Demand Videos to learn from industry leaders
Virtual Labs to gain hands on experience and apply what you learned
Assessments to gauge understanding and comprehension

Certificate of Completion

Certificate Of Completion

Complete this entire course to earn a Scanning, Enumeration, and Vulnerabilities Certificate of Completion

Verticals

CyberSecurity