CEH v12: Scan Optimization OS Identification and IDS/Firewall Evasion

placeholder

Running nmap scans can sometimes take a lot of time.

In this course you;ll explore a few options and techniques for decreasing the amount of time you wait for nmap to complete its scans. Knowing what operating system your target is running sets the stage for how you;ll conduct the subsequent steps of your hacking methodology so you;ll also examine common tools and techniques for discovering a target host OS. Finally you;ll learn about tactics and tools that can be used to help you evade common network security controls such as firewalls and intrusion detection systems (IDS).

This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.