Network Survey & Extraction: Network Analysis

placeholder

Knowing what devices and services are running on a network is an essential part of computer security. Being able to effectively scan a network is the first step in securing it. In this course you ll learn how to discover and analyze networks through scanning. First you ll explore common network scanning tools how to identify network vulnerabilities and how to perform reverse IP lookup. You ll then move on to learn how to identify services and operating systems and about scanning techniques such as UDP stealth connect zombie and ARP scanning.