Ethical Hacking; Network Analysis and Vulnerability Scanning
Course Features
Delivery Method
Online
Available on
Limited Access
Accessibility
Mobile, Desktop, Laptop
Language
English
Subtitles
English
Level
Advanced
Teaching Type
Self Paced
Course Description
Course Overview
Post Course Interactions
Instructor-Moderated Discussions
Skills You Will Gain
What You Will Learn
Analyze the commonly used Nmap commands related to host discovery
Describe how web applications are hacked through penetration testing
Describe the four port scanning techniques in Nmap discussed in this lesson
Explain the concept of Cross-Site Scripting (XSS) Vulnerabilities
Explain the meaning of Nmap scripts and how they are used
Explain the process of network scanning using the Nmap tool
Explain the role of Network Mapper (Nmap) in ethical hacking
Identify the basic features of the Network Mapper (Nmap)
Outline the importance of file uploads for web applications
