Alison's New App is now available on iOS and Android! Download Now

Ethical Hacking; Network Analysis and Vulnerability Scanning

Learn about network analysis and vulnerability scanning in this free online course.

Publisher: NPTEL
This free online network analysis and vulnerability scanning course is important for individuals worried about their systems or networks. The course gives some great insights on how a network can be analysed to detect vulnerabilities within it. Such vulnerabilities can be used by attackers to hack into a network and cause great damage. By the end of the course, you will be well equipped to scan your own network for security loopholes within it.
Ethical Hacking; Network Analysis and Vulnerability Scanning
  • Duration

    3-4 Hours
  • Students

  • Accreditation


Share This Course And
Earn Money  

Become an Affiliate Member





View course modules


This course will begin by introducing you to the concept of web application vulnerability scanning. You will learn about SQL injection authentication, SQLMAP and cross-site scripting. You will learn that cross-site scripting is a web security vulnerability that allows an attacker to compromise the interactions that users have with the vulnerable application. You will also learn the importance of file uploads for many web applications, as well as its risks to the application if proper security controls are not implemented.

The course then explains the applications of network analysis tools like Nmap and Wireshark. Next, you will see a live demonstration of how these two tools are used for network analysis and network vulnerability scanning. You will then see an overview of the open-source vulnerability scanning tool Nmap, learn the basic features of Nmap and some commonly used commands which relate to host discovery.

Finally, you will learn about port scanning using Nmap including various port scanning techniques like TCP connect scan, TCP SYN scan, TCP Stealth scan and FTP Bounce scan. You will further understand how scripts are used in Nmap and also the common example options typically used in Nmap. You will then learn about the numerous menu options in Wireshark and also see some live packet capturing examples using Wireshark. Start this course today and be your own boss in network analysis and vulnerability scanning.

Start Course Now