CEH v13: Scanning

placeholder

In the ever-evolving landscape of cybersecurity, network scanning plays a pivotal role in identifying vulnerabilities before malicious actors exploit them.In this course, learn about the various types and uses of scanning in cybersecurity, network and port scanning, TCP/IP communication, and the three-way handshake. Next, discover how to perform OS and host discovery with AI tools like ShellGPT and the key approaches for bypassing IDS/IPS. Finally, explore common scanning tools such as Nmap, Nessus, Nikto, OpenVAS, Wireshark, Angry IP Scanner, and Netcat.This course can be used in preparation for the Certified Ethical Hacker (CEH) 312-50 exam.