For Educators
What are OER?
Find OER
List of OER Courses
Adopted OER
Get Help
Library Resources
For Students
Find Courses
Course Reserves
Impact
About
Learning Object
Port Scanning
Author
: Joseph Wetzel
Subject
: IT Security
Source
:
Wisc-Online
Share
Description
In this learning activity you'll explore how port scanning is commonly used by hackers to infiltrate a network and how IT security professionals can detect it.
Items related to the subject
IT Security
Learning Object
Port Scanning
Learning Object
Port Scanning - Common Network Protocols
Learning Object
Achieve Persistence on the Web
Learning Object
Firewalls: Relationships Among Firewall Perimeters
Learning Object
FTP - What You Need to Know
Learning Object
Firewall: Stateful Packet Inspection
Learning Object
Authentication versus Authorization
Learning Object
Denial of Service Attacks
Learning Object
Setting Up Your Virtual Private Network (VPN)
Learning Object
DDoS - Distributed Denial of Service Attacks
Learning Object
Cross-Site Scripting Defined
Learning Object
SSH - Secure Shell
Learning Object
Asymmetric Encryption: How It Works
Learning Object
Intrusion Detection Systems
Learning Object
Port States
Learning Object
Virtual Private Networks (VPN)
Learning Object
Man in the Middle Attacks with ARP Poisoning
Learning Object
Cross-site Scripting Awareness