Internet And Network Technologies
Network Survey and Extraction Best Practices
Network Survey & Extraction: Network Analysis
Network Survey & Extraction: Network Monitoring

Network Survey & Extraction: Network Analysis

Course Number:
it_cynsexdj_01_enus
Lesson Objectives

Network Survey & Extraction: Network Analysis

  • discover the key concepts covered in this course
  • recognize different tools used for network scanning
  • identify common network vulnerabilities found during scanning
  • recognize best practices for documenting physical and alternative network vulnerabilities
  • prioritize network scanning activities to maximize efficiency
  • perform reverse DNS lookups on IP addresses
  • identify and enumerate services using a basic scan
  • identify operating systems and versions using network scanning
  • perform a network discovery using UDP scanning techniques
  • perform a scan using stealth methods to evade detection
  • perform TCP connect scans using Nmap
  • perform an idle scan through a zombie host
  • perform ARP scans to find hidden hosts on a network
  • summarize the key concepts covered in this course

Overview/Description

Knowing what devices and services are running on a network is an essential part of computer security. Being able to effectively scan a network is the first step in securing it. In this course, you'll learn how to discover and analyze networks through scanning. First, you'll explore common network scanning tools, how to identify network vulnerabilities, and how to perform reverse IP lookup. You'll then move on to learn how to identify services and operating systems, and about scanning techniques such as UDP, stealth, connect, zombie, and ARP scanning.



Target

Prerequisites: none

Network Survey & Extraction: Network Monitoring

Course Number:
it_cynsexdj_02_enus
Lesson Objectives

Network Survey & Extraction: Network Monitoring

  • discover the key concepts covered in this course
  • recognize tips and tricks for monitoring services
  • develop data management practices for network data collected from scans
  • identify network vulnerability metrics
  • develop strategies for network reporting and record keeping
  • perform DNS host discovery
  • perform requests with netcat and other tools to pull banner information from services
  • filter connection information from network data using tcpdump
  • filter protocol details from network data using tcpdump
  • collect server and network technology and infrastructure data
  • detect firewall type and version information
  • scan for SSL/TLS version and cipher capabilities
  • test for SMTP version information and open relay vulnerabilities
  • summarize the key concepts covered in this course

Overview/Description

Developing techniques to scan and monitor networks is a process of discovery. Being able to continuously monitor or schedule regular tests for vulnerabilities is part of the ongoing battle of network security. In this course, you'll learn to test and take inventory of network hosts so you can monitor more effectively. First, you'll examine methods for actively monitoring and collecting data, as well as strategies for reporting and sharing results. You'll then move on to tools to catalog, compare, filter, and test services, so that any anomaly can be picked up in your scanning activities.



Target

Prerequisites: none

Close Chat Live