Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
Module 1: Introduction
Module 2: Check for Live Systems & Ports
Module 3: Scanning
Module 4: Fingerprinting & Banner Grabbing
Module 5: Enumeration Tools
Module 6: Vulnerabilities
Module 7: Conclusion
Attackers use scanning and enumeration to determine what live systems are on the network (host discovery) and additional information about those systems, like the operating system in use and software version. With vulnerability scanning, an attacker attempts to locate specific weaknesses in system software. Specifically, the attacker is hoping to find known vulnerabilities (CVE) that they can easily exploit. This course is designed to be predominantly hands-on and covers the theory of scanning, enumeration, and vulnerabilities at a high-level.
Certificate of Completion
Complete this entire course to earn a Scanning, Enumeration, and Vulnerabilities Certificate of Completion