Ethical Hacker: Scanning


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

One of the early stages in ethical hacking is reconnaissance of the target. In this 10-video course, you can explore various scanning tools and techniques used in ethical hacking, including Nmap, OWASP ZAP, Vega, Shodan, and specialized Google searches. Key concepts covered in this course include how to use Nmap, an open-source network scanner and one of the most widely-used scanning tools for scanning a target system or network; how to use OWASP ZAP, an open-source web application security scanner, to scan a target website; and how to use Vega, an open-source web security scanner and testing platform, to scan a target website. Next, learners observe how to use the Shodan search engine to gather information about vulnerabilities, its purpose and usage, and the role it plays in ethical hacking and penetration testing. Finally, learn how to use multiple informational websites to gain information about a target; and apply specialized advanced Google searches to find information for ethical hacking.



Expected Duration (hours)
0.6

Lesson Objectives

Ethical Hacker: Scanning

  • discover the key concepts covered in this course
  • describe NMAP and how it can be used
  • use NMAP to scan a target system or network
  • use OWASP ZAP to scan a target web site
  • use Vega to scan a target web site
  • describe the Shodan search engine, its purpose and usage, and the role it plays in ethical hacking and penetration testing
  • use Shodan to gather information about vulnerabilities
  • use multiple informational web sites to gain information about a target
  • apply specialized Google searches to find information for ethical hacking
  • summarize the key concepts covered in this course
  • Course Number:
    it_soethhdj_06_enus

    Expertise Level
    Intermediate