2. Scanning and Demo

Now that you know what surveying and enumeration are, it's time to put that knowledge into action. Running Metasploitable on a virtual box, you will learn how to use Nmap, ping sweep scan, ARP Scan, and whois lookup to determine which targets are the easiest to get to. 

Complete and Continue  

Become a Member and Get Unlimited Access to 340+ Top Cyber Security Courses.