CEH v12: Nmap TCP Scans

placeholder

When scanning a target with nmap for open ports and/or services there are several common types of scans.

In this course you;ll explore TCP Connect scans how to issue a TCP Connect scan with nmap and pros and cons of using this type of scan. You;ll also look at Stealth and TCP scans how to issue them with nmap and their pros and cons. Next you;ll examine how good network security professionals employ firewalls to protect their assets and how this can hinder network-based recon activities. Finally you;ll learn about using nmap ACK scan for the purposes of mapping possible firewall rules enumerating port states.

This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.