Category: Network defense
-
Outcomes addressed in this activity: Describe common port scanning tools and tec
Outcomes addressed in this activity: Describe common port scanning tools and tec Outcomes addressed in this activity: Describe common port scanning tools and techniques. Explain the enumeration step of security testing. Use scanning and enumeration to identify potential vulnerabilities for exploitation. Use appropriate tools to capture network traffic in order to perform a threat analysis.…
-
Outcomes addressed in this activity: Unit Outcomes: Outline the steps of the inf
Outcomes addressed in this activity: Unit Outcomes: Outline the steps of the inf Outcomes addressed in this activity: Unit Outcomes: Outline the steps of the information gathering process. Describe common social engineering techniques. Describe common information, networking, and physical security attacks. Use appropriate reconnaissance tools and techniques. Course Outcome: IT542-1: Analyze the methods ethical hackers use…
-
Outcomes addressed in this activity: Unit Outcomes: Outline the steps of the inf
Outcomes addressed in this activity: Unit Outcomes: Outline the steps of the inf Outcomes addressed in this activity: Unit Outcomes: Outline the steps of the information gathering process. Describe common social engineering techniques. Describe common information, networking, and physical security attacks. Use appropriate reconnaissance tools and techniques. Course Outcome: IT542-1: Analyze the methods ethical hackers use…