1 00:00:00,210 --> 00:00:05,850 And now, my friends, it's lab time, it's just a jump to the left. 2 00:00:08,700 --> 00:00:11,970 Please try to perform these steps in your lab environment. 3 00:00:13,000 --> 00:00:15,160 First, go to your Nessa's web interface. 4 00:00:16,100 --> 00:00:21,320 Create a new Skåne policy, see and modify the options as much as you can. 5 00:00:22,430 --> 00:00:23,690 Chew's destination's. 6 00:00:25,100 --> 00:00:30,140 Try to give a text file as the destination hosts list, start the scan. 7 00:00:31,170 --> 00:00:38,010 And analyze the results, so you've made it to the end of the course, but before you run out testing 8 00:00:38,010 --> 00:00:42,750 every single network you can find, let's remember what we learned in this course. 9 00:00:44,380 --> 00:00:50,140 Firstly, we learned how to prepare the lab environment, how to download and set up Métis voidable 10 00:00:50,140 --> 00:00:51,340 to to compromise. 11 00:00:53,050 --> 00:00:56,560 Scan types, passive scans and active scans. 12 00:00:57,540 --> 00:01:01,330 Perform some passive scans using Wireshark and AAFP tables. 13 00:01:01,560 --> 00:01:10,050 The fundamentals of the TCP IP family with the basics of TCP and UDP protocols, active scan in detail 14 00:01:10,050 --> 00:01:10,830 using Inmet. 15 00:01:12,750 --> 00:01:21,360 The most important and maps times no port scan, also known as Say It With Me, ping scan, synth scan, 16 00:01:21,840 --> 00:01:28,050 TCP scan and UDP scan comparison of this scan and the TCP scan. 17 00:01:30,150 --> 00:01:32,290 What about the details of port scanning? 18 00:01:32,940 --> 00:01:37,460 We also learned about the service and the version detection and why that's important. 19 00:01:39,670 --> 00:01:46,310 And how did it affect the operating system of a host, the details of input and output management and 20 00:01:46,310 --> 00:01:46,750 then Matt? 21 00:01:47,790 --> 00:01:52,140 And map scripting engine or NSC performing scripts, scans. 22 00:01:53,810 --> 00:01:55,190 Some important scripts. 23 00:01:56,600 --> 00:01:59,150 And timing and map scams. 24 00:02:03,020 --> 00:02:06,650 We also learned about bypassing IEDs and GPS devices. 25 00:02:08,830 --> 00:02:10,960 And remember some of the other and map scans. 26 00:02:12,310 --> 00:02:17,950 NULL scan, Fyn scan, Christmas scan, x scan, idol scan. 27 00:02:19,560 --> 00:02:22,110 We also went into the definition of vulnerability. 28 00:02:23,100 --> 00:02:26,190 And then scanning vulnerabilities with Nessus. 29 00:02:27,470 --> 00:02:34,190 We went over how to download, install and run Nessus on Collee and how to perform in Nessus vulnerability 30 00:02:34,190 --> 00:02:37,190 scan and export, the result reports. 31 00:02:38,470 --> 00:02:43,870 And that about does it for me, I really hope you enjoy the course and I hope to see you in another 32 00:02:43,870 --> 00:02:45,220 cybersecurity course. 33 00:02:45,820 --> 00:02:47,500 Till then, stay safe, my friends.