CEH v12: Network Scanning TCP Host Discovery and Port/Service Scanning

placeholder

An ethical hacker can be most effective when employing the right tools for the job.

In this course you;ll learn about networking scanning types and the various flags used in TCP communication. Next you;ll explore commonly used network scanning tools used by many of today security professionals. You;ll then move on to learn about tools that can be used for host discovery common methods of implementation and even some countermeasures for prevention purposes. Finally you;ll examine the differences between port and service scans their use cases and common port/service associations.

This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.