Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Cybrary

Scanning, Enumeration, and Vulnerabilities

via Cybrary

Overview

Attackers use scanning and enumeration to determine what live systems are on the network (host discovery) and additional information about those systems, like the operating system in use and software version. With vulnerability scanning, an attacker attempts to locate specific weaknesses in system software. Specifically, the attacker is hoping to find known vulnerabilities (CVE) that they can easily exploit. This course is designed to be predominantly hands-on and covers the theory of scanning, enumeration, and vulnerabilities at a high-level.

Syllabus

  • Introduction
    • Scanning & Enumeration Introduction
  • Check for Live Systems & Ports
    • Checking for Live Systems Lab Part 1
    • Checking for Live Systems Lab Part 2
    • Performing a Check for Live Systems
    • Checking for Open Ports Lab Part 1
    • Checking for Open Ports Lab Part 2
    • Performing a Check for Open Ports
  • Scanning
    • Scanning Introduction
    • Scanning with with NMAP Half Connect Scan
    • Scanning with NMAP Full Connect Scan
    • Scanning with XMAS Scan Part 1
    • Scanning with XMAS Scan Part 2
    • Scanning with NMAP ACK Scan
    • Scanning with NMAP ACK Scan and Windows Firewall
    • Scanning with hping3 and SYN Scan
    • Scanning with hping3 and ACK Scan
    • Scanning with hping3 and XMAS Scan
    • Scanning with hping3, ACK Scan, and Windows Firewall
    • Implementing Scanning Techniques
  • Fingerprinting & Banner Grabbing
    • OS Fingerprinting
    • OS Fingerprinting
    • Banner Grabbing
    • Banner Grabbing
  • Enumeration Tools
    • Zenmap
    • Dig and Finger Commands
    • Using Enumeration Tools
  • Vulnerabilities
    • Vulnerability Scanner Setup and Configuration of Core Impact Part 1
    • Vulnerability Scanner Setup and Configuration of Core Impact Part 2
    • Vulnerability Scanner Set-up and Configuration
    • Vulnerability Scanner Setup and Configuration of OpenVAS Part 1
    • Vulnerability Scanner Setup and Configuration of OpenVAS Part 2
    • Vulnerability Scanner Set-up and Configuration, Pt. 2
  • Conclusion
    • Vulnerability Scan Assessment Overview
    • Vulnerability Scan
    • Scanning, Enumerations, & Vulnerabilities Conclusion

Taught by

Ken Underhill

Reviews

Start your review of Scanning, Enumeration, and Vulnerabilities

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.