CEH v11: Nmap TCP Scans
When scanning a target with Nmap for open ports and/or services there are several common types of scans. In this course you;ll explore TCP Connect scans how to issue a TCP Connect scan with Nmap and pros and cons of using this type of scan. You;ll also look at Stealth and TCP scans how to issue them with Nmap and their pros and cons. Next you;ll examine how good network security professionals employ firewalls to protect their assets and how this can hinder network-based recon activities. Finally you;ll learn about using Nmap ACK scan for the purposes of mapping possible firewall rules enumerating port states. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.