Scanning, Enumerations, & Vulnerabilities Conclusion

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *

Already have an account? Sign In »

8 hours 49 minutes
Video Transcription
Hey, everyone, welcome back to the course. So in the last video, we talked about the vulnerability assessments. So again, if you have access to the paid cyber content, you want to go ahead and complete that assessment. If you don't as an alternative, you could just go ahead and practice vulnerability scanning that will help you become
a better penetration tester and also a better defender if you decide to work on that side of the fence.
So this video, we're just gonna wrap up the course, we'll talk about the things we covered. And I just want to say thank you for taking the course again. And congratulations on making it this far in the course. Now if for some reason you have not downloaded any of the supplement of Resource is yet, So if you for some reason didn't download the step by step lab guys if he didn't download any of the resource is we've provided for you,
be sure to do that before you fully in the course here.
That way you can use that information to be better in your career.
So what do we cover? This course we'll, of course, in the different models. We started and ended with an introduction, and then here we're at the conclusion now. But we also went ahead and on and checked for life systems as well as live ports. We also did generalize scanning, but we use different flags for simple. We did like Christmas scans.
We did sin scans or basically that first part of the TCP through a handshake.
Most of the operating system fingerprinting as well as banner grabbing, which Afghanis is telling us what kind of version of the software might be running software, is it or what kind of operating system is in use?
We ran different enumeration tools. We also went ahead into their vulnerability scanners. So if you'll recall, wait a couple of different labs in there. But we went ahead and learned a little bit about vulnerability scanners and were able to see with open Voss. We were able to see the different vulnerabilities that it produced for us again. Open Boss is a pretty common one alongside nets necessary, which is a paid model
again. Open, open, vast. Excuse me
is a free version.
So again, I just want to thank you for this course so as I mentioned before in the syllabus document. There's a grouping of different courses that you should take this kind of your next step. So it's in The supplement of resource is so again, if you haven't downloaded all that good, juicy, lovely stuff that we provided for you, then be sure to do so.
And I thank you for taking this course. If you want to learn more about penetration testing in general,
then feel free to go ahead and take my penetration. Testing an ethical hacking course where we kind of walked through. A lot of the different areas you would need to understand is a penetration tester. Now I want to stress that that course isn't gonna make you like the world's greatest hacker or anything like that. It is an introductory type level course, and primarily to help you focus and pass the
easy council certified ethical hacker examination.
So again, thank you for watching this course, and I'll see you in the next one