Join millions using the Alison App – faster, easier, and made for learning on the move... 📲 Learn On The Go With
The Alison App
Explore
en
LMS
en
Site language

Your Learner Verification

This is to verify that Γιάννης Αναγνωστόπουλος has completed the course Ethical Hacking; Network Analysis and Vulnerability Scanning on Alison.

Γιάννης Αναγνωστόπουλος

Alison ID: 19022299

Course Completed: Ethical Hacking; Network Analysis and Vulnerability Scanning

Date of Completion: 22nd October 2023

Email: [email protected]

Total Study Time: 2h 50m

Final Assessment Score:

Alison courses requires at least
80% to pass the final assessment

80%
CPD Hours Completed:

CPD approved learning hours
completed through this course

1-3h

Course Information

Learn about network analysis and vulnerability scanning in this free online course.

This course will begin by introducing you to the concept of web application vulnerability scanning. You will learn about SQL injection authentication, SQLMAP and cross-site scripting. You will learn that cross-site scripting is a web security vulnerability that allows an attacker to compromise the interactions that users have with the vulnerable application. You will also learn the importance of file uploads for many web applications, as well as its risks to the application if proper security controls are not implemented.


The course then explains the applications of network analysis tools like Nmap and Wireshark. Next, you will see a live demonstration of how these two tools are used for network analysis and network vulnerability scanning. You will then see an overview of the open-source vulnerability scanning tool Nmap, learn the basic features of Nmap and some commonly used commands which relate to host discovery.


Finally, you will learn about port scanning using Nmap including various port scanning techniques like TCP connect scan, TCP SYN scan, TCP Stealth scan and FTP Bounce scan. You will further understand how scripts are used in Nmap and also the common example options typically used in Nmap. You will then learn about the numerous menu options in Wireshark and also see some live packet capturing examples using Wireshark. Start this course today and be your own boss in network analysis and vulnerability scanning.

Modules Completed

Module 1: Vulnerability Scanning
Module 2: Network Analysis Tools
Module 3: Course assessment

Tell us why you need your learner verification?



professional/learner-record.learner_verification.Save