Certified Ethical Hacker (CEH) v8: Network Scanning

This course is included in our On-demand training solution.


Network scanning refers to a set of intelligence gathering procedures hackers perform to identify hosts, ports, and other vulnerabilities in a network. By finding such vulnerabilities, a hacker can create an accurate profile of the target organization. An ethical hacker is a person who attacks an organization’s security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. In this course, we look at network scanning, and the tools and techniques used. This course is the third in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.

Target Audience

Network and information security professionals



Expected Duration

90 min.

Course Objectives

Network Scanning Overview

  • identify the purposes of network scanning
  • Scanning for Open Ports

  • match the type of scan with its description
  • Banner Grabbing and Vulnerability Scanning

  • match the network scanning tool to its purpose
  • Proxy Servers and Tunneling

  • identify tools used to hide an attacker’s identity
  • Censorship, Privacy, and IP Spoofing

  • identify methods used to bypass censorship
  • Scanning Penetration Testing

  • identify the methods performed as part of scanning penetration testing
  • Scanning Tools and Methodologies





    Multi-license discounts available for Annual and Monthly subscriptions.