Every registration supports local education. TrainUp Gives Back

Your Career Training Marketplace

Questions? Call Toll-Free: 1-866-540-9677

When you register for training with TrainUp.com, you are also supporting local education. Find out how.
  • Instant Access ImageInstant Access
    From Anywhere
  • Unlimited Viewing ImageUnlimited
  • calendar Image 6-12 Months
    To Complete


Network scanning refers to a set of intelligence gathering procedures hackers perform to identify hosts, ports, and other vulnerabilities in a network. By finding such vulnerabilities, a hacker can create an accurate profile of the target organization. An ethical hacker is a person who attacks an organization’s security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. In this course, we look at network scanning, and the tools and techniques used. This course is the third in a series of courses which can used in preparation for the Certified Ethical Hacker 312-50 exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures course materials and labs.

Learning Objectives
  • Identify the purposes of network scanning
  • Match the type of scan with its description
  • Match the network scanning tool to its purpose
  • Identify tools used to hide an attacker's identity
  • Identify methods used to bypass censorship
  • Identify the methods performed as part of scanning penetration testing
  • Identify the techniques and tools used in network scanning
  • Audience

Get the latest industry news, recommended courses, & promotions from TrainUp.com sent straight to your inbox.