Ethical Hacking: Scanning
Scanning is a technique that allows for a deep dive into a system to seek out valuable data and services in an IP address range. Scanning techniques locate potential entry points on a system to exploit. This type of scanning is key to ethical hackers who are responsible for preventing attacks on an organization
What you will learn:
- Describe different types of scanning
- Summarize network & port scanning techniques and list relevant tools
- Explain fragmentation scanning and banner grabbing
- Describe how vulnerability scanners work
This course is part of the following course program:
Hacking Your Company: Ethical Solutions to Defeat Cyber Attacks
Courses included in this program
Who should attend: Electrical Engineer, Software Engineer, Design Engineer, AI/ML Engineer, Computer Engineer, Systems Engineer, Communications, Product Engineer, Lead Engineer, Project Engineer, QA/Quality Engineer, IT Director/Manager/Consultant/Auditor, Security Consultant/Manager, Security Auditor/Architect, Security Systems Engineer, Chief Information Security Officer, Chief Compliance/Privacy/Risk Officer, Network Specialist/Analyst/Manager/Architect/Consultant/Administrator, Technical Support Engineer, Systems Analyst/Administrator
Sean Oriyano is a seasoned security professional and entrepreneur. Over the past 25 years he has split his time between writing, researching, consulting and training various people and organizations on a wide range of topic relating to both IT and security. As an instructor and consultant Sean has traveled to all different places all over the world sharing his knowledge as well as gaining exposure to many different environments and cultures along the way. His broad knowledge and easy to understand manner, with a healthy dose of humor, have led to Sean being a regularly requested instructor.
Outside of training and consulting Sean is also a best-selling author with many years experience in both digital and print media. Sean has published books for McGraw-Hill, Wiley, Sybex, O'Reilly Media and Jones & Bartlett. Over the last decade Sean has also expanded his reach even further by appearing on shows in both TV and radio. To date, Sean has appeared in over a dozen TV programs and radio shows discussing different cyber security topics and technologies.
Outside his own business activities Sean is a member of the military as a Chief Warrant Officer specializing in infrastructure and security as well as the development of new troops. Additionally, as a CWO he is recognized as a Subject Matter Expert in his field and is frequently called upon to provide expertise, training and mentoring wherever needed.
When not working Sean is an avid Obstacle Course Racer having completed numerous races, a world championship race and a Spartan Trifecta. He also enjoys traveling, bodybuilding, training and MMA.
Publication Year: 2016