Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Pluralsight

Performing and Analyzing Network Reconnaissance

via Pluralsight

Overview

Seeing what is currently being exposed about your networks and company resources is vital. This course will provide a fundamental understanding of both reconnaissance and scanning and how it can affect your security posture.

You've been tasked as an "Incident Handler" and you are wondering where you start. Attackers typically start with doing a little "reconnaissance" of their target, so it only makes sense that you start there as well. In this course, Performing and Analyzing Network Reconnaissance, you will learn how to think like an attacker in order to stay a step ahead of one. First, you will learn about the two different steps of reconnaissance and scanning. Next, you will learn what to look for, how it's done, and what you can do to protect your infrastructures. Finally, you will learn about tools you can use that the attacker will use against you. By the end of this course, you'll know how to look at your infrastructure the same way attackers do, and understand the process to minimize those threats.

Topics:
  • Course Overview
  • The Two Steps
  • Initially What Do You Look For?
  • The More You Look, the More You Find
  • Other Reconnaissance Techniques
  • Reconnaissance via Google Hacking
  • Let's Not Forget PowerShell
  • Overview of Scanning
  • Understanding the 3-way Handshake
  • Checking for 'Live' Systems and Their Open Ports
  • Types of Scanning
  • Banner Grabbing and OS Fingerprinting
  • More Tools for the Utility-belt
  • Threats from Wireless

Taught by

Dale Meredith

Reviews

4.3 rating at Pluralsight based on 26 ratings

Start your review of Performing and Analyzing Network Reconnaissance

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.