Module 1 - The principles of Ethical Hacking

From WikiEducator
Jump to: navigation, search

Icon objectives.jpg
By the end of this module you will be able to:
  • Understand the principles of Ethical hacking
  • Apply the Ethical hacking methodology

Icon activity.jpg
Download and install nmap from Install and configure it and run it as a test on your network. Email the list of targets

Icon define.gif
  1. Passive Scanning:
  2. Active Scanning: