
Network Discovery Tools and Techniques
$150.00
BICSI Members save more. Login or become a Member today.
CECs
1
In this OnDemand course, ICT professionals will learn about the OSI and TCP/IP models, and how they are used to facilitate communication between entities on a network. Explore how security controls behave at different layers of the OSI and TCP/IP models. Explore common network devices and learn how they can be compromised physically or administratively. Discover how to differentiate between discovery, footprinting, and scanning tools, and explore categories of discovery tools including auditing, vulnerability scanning, and SNMP. Explore Nmap, Zenmap, and SuperScan network discovery tools, and learn when to use protocol analyzer tools such as Wireshark. Lastly, discover the benefits of periodically referencing the Common Vulnerabilities and Exposures database. This course was originally created by Global Knowledge (GK). This course provides the process of identifying or mapping internal networks and computer resources in an organization. Conveniently, network discovery tools can be used to automate the scanning process and discover all the devices on a specific network.
Course Highlights
![]() |
Discover the key concepts covered in this course |
![]() |
Recall the fundamentals of the confidentiality, integrity, and availability (CIA) trial |
![]() |
Describe how the Open Systems Interconnection Model (OSI) model is used to facilitate the communication between entities |
![]() |
List fundamentals of the TCP/IP model |
![]() |
Recognize how security controls behave at different layers of the OSI and TCP/IP models |
![]() |
Differentiate between common networking device types |
![]() |
Recognize how network devices can be compromised physically or administratively |
![]() |
Differentiate between discovery, footprinting, and scanning tools |
![]() |
Determine what tool restrictions are in place on a network |
![]() |
List categories of discovery tools including auditing, vulnerability scanning, and SNMP |
![]() |
Use network discovery tools such as a network sniffer |
![]() |
Provide an overview of the Internet Control Message Protocol (ICMP) protocol |
![]() |
Use the ping and traceroute command line tools |
![]() |
Identify an IP address owner using website such as IANA.org and ARIN.net |
![]() |
Differentiate between Nmap, Zenmap, and SuperScan network discovery tools |
![]() |
Recognize when to use protocol analyzer tools such as Wireshark |
![]() |
Provide an overview of the Simple Network Management Protocol (SNMP) protocol |
![]() |
Differentiate between the Nessus and Retina vulnerability scanning tools |
![]() |
Provide an overview of the Common Vulnerabilities and Exposures database |
![]() |
Recognize the importance of implementing company security policies |
![]() |
Provide an overview of vulnerabilities and list common reasons for vulnerabilities |
Cancellation Policy
All BICSI Connect courses are nonrefundable and nontransferable.
Frequently Asked Questions
Who Should Attend?
This course is intended for all ICT professionals.
Technical Requirements
-
Operating Systems:
-
Windows: Windows 10 or later
-
Mac: macOS 11 (Big Sur) or later
-
Mobile Devices:
-
iOS: iOS 14 or later
-
Android: Android 10 or later
-
-
-
Browsers (latest versions recommended):
-
Google Chrome
-
Mozilla Firefox
-
Microsoft Edge
-
Safari
-
-
Internet Requirements: A stable high-speed internet connection