Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

Ethical Hacking; Network Analysis and Vulnerability Scanning

Course Cover
compare button icon

Course Features

icon

Delivery Method

Online

icon

Available on

Limited Access

icon

Accessibility

Mobile, Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Advanced

icon

Teaching Type

Self Paced

Course Description

This course will begin by introducing you to the concept of web application vulnerability scanning. You will learn about SQL injection authentication, SQLMAP and cross-site scripting. You will learn that cross-site scripting is a web security vulnerability that allows an attacker to compromise the interactions that users have with the vulnerable application. You will also learn the importance of file uploads for many web applications, as well as its risks to the application if proper security controls are not implemented. The course then explains the applications of network analysis tools like Nmap and Wireshark. Next, you will see a live demonstration of how these two tools are used for network analysis and network vulnerability scanning. You will then see an overview of the open-source vulnerability scanning tool Nmap, learn the basic features of Nmap and some commonly used commands which relate to host discovery. Finally, you will learn about port scanning using Nmap including various port scanning techniques like TCP connect scan, TCP SYN scan, TCP Stealth scan and FTP Bounce scan. You will further understand how scripts are used in Nmap and also the common example options typically used in Nmap. You will then learn about the numerous menu options in Wireshark and also see some live packet capturing examples using Wireshark. Start this course today and be your own boss in network analysis and vulnerability scanning.

Course Overview

projects-img

Post Course Interactions

projects-img

Instructor-Moderated Discussions

Skills You Will Gain

What You Will Learn

Analyze the commonly used Nmap commands related to host discovery 

Describe how web applications are hacked through penetration testing

Describe the four port scanning techniques in Nmap discussed in this lesson 

Explain the concept of Cross-Site Scripting (XSS) Vulnerabilities 

Explain the meaning of Nmap scripts and how they are used

Explain the process of network scanning using the Nmap tool

Explain the role of Network Mapper (Nmap) in ethical hacking 

Identify the basic features of the Network Mapper (Nmap)

Outline the importance of file uploads for web applications

Course Cover