Network Discovery Tools and Techniques

$150.00

CECs

1

In this OnDemand course, ICT professionals will learn about the OSI and TCP/IP models, and how they are used to facilitate communication between entities on a network. Explore how security controls behave at different layers of the OSI and TCP/IP models. Explore common network devices and learn how they can be compromised physically or administratively. Discover how to differentiate between discovery, footprinting, and scanning tools, and explore categories of discovery tools including auditing, vulnerability scanning, and SNMP. Explore Nmap, Zenmap, and SuperScan network discovery tools, and learn when to use protocol analyzer tools such as Wireshark. Lastly, discover the benefits of periodically referencing the Common Vulnerabilities and Exposures database. This course was originally created by Global Knowledge (GK). This course provides the process of identifying or mapping internal networks and computer resources in an organization. Conveniently, network discovery tools can be used to automate the scanning process and discover all the devices on a specific network.

 

Course Highlights

Discover the key concepts covered in this course
Recall the fundamentals of the confidentiality, integrity, and availability (CIA) trial
Describe how the Open Systems Interconnection Model (OSI) model is used to facilitate the communication between entities
List fundamentals of the TCP/IP model
Recognize how security controls behave at different layers of the OSI and TCP/IP models
Differentiate between common networking device types 
Recognize how network devices can be compromised physically or administratively
Differentiate between discovery, footprinting, and scanning tools 
Determine what tool restrictions are in place on a network 
List categories of discovery tools including auditing, vulnerability scanning, and SNMP 
Use network discovery tools such as a network sniffer 
Provide an overview of the Internet Control Message Protocol (ICMP) protocol 
Use the ping and traceroute command line tools 
Identify an IP address owner using website such as IANA.org and ARIN.net 
Differentiate between Nmap, Zenmap, and SuperScan network discovery tools 
Recognize when to use protocol analyzer tools such as Wireshark 
Provide an overview of the Simple Network Management Protocol (SNMP) protocol 
Differentiate between the Nessus and Retina vulnerability scanning tools 
Provide an overview of the Common Vulnerabilities and Exposures database 
Recognize the importance of implementing company security policies 
Provide an overview of vulnerabilities and list common reasons for vulnerabilities 

 

Cancellation Policy

All BICSI Connect courses are nonrefundable and nontransferable.

 

Frequently Asked Questions

Who Should Attend?

This course is intended for all ICT professionals.

Technical Requirements

  • Operating Systems:

    • Windows: Windows 10 or later
    • Mac: macOS 11 (Big Sur) or later
    • Mobile Devices:

      • iOS: iOS 14 or later
      • Android: Android 10 or later
  • Browsers (latest versions recommended):

    • Google Chrome
    • Mozilla Firefox
    • Microsoft Edge
    • Safari
  • Internet Requirements: A stable high-speed internet connection

How Long is This Workshop?

One-hour self-paced course with 90 days from the date of purchase to complete