Skip main navigation

Scanning Tools and Methodology

In this video, you will learn about the use of scanning tools to protect your network from attacks.
00:00
00:00

In this video, you will learn about the use of scanning tools to protect your network from attacks. We will start by looking at the use of Nmap/Zenmap, and in the next step you will learn about other packages you could use.

There are many types of scanning tools available to help you protect your network from attacks. It is important that you select an appropriate tool and that you are then vigilant in using it to regularly scan your network so that you can identify and prevent attacks as quickly as possible.

We will also focus on the use of Nmap/Zenmap as a scanning tool, with a demonstration on how to use this software package.

Reflect and share: Which of the protection approaches discussed in the video have you already been using, and how have you implemented it? Share your comments in the section below.

This article is from the free online

Advanced Cyber Security Training: Network Security

Created by
FutureLearn - Learning For Life

Reach your personal and professional goals

Unlock access to hundreds of expert online courses and degrees from top universities and educators to gain accredited qualifications and professional CV-building certificates.

Join over 18 million learners to launch, switch or build upon your career, all at your own pace, across a wide range of topic areas.

Start Learning now