﻿1
00:00:00,210 --> 00:00:05,880
‫And now, my friends, it's lab time, it's just a jump to the left.

2
00:00:08,730 --> 00:00:12,000
‫Please try to perform these steps in your lab environment.

3
00:00:13,020 --> 00:00:15,210
‫First, go to your Nessa's web interface.

4
00:00:16,120 --> 00:00:21,360
‫Create a new Skåne policy, see and modify the options as much as you can.

5
00:00:22,480 --> 00:00:23,710
‫Chew's destination's.

6
00:00:25,150 --> 00:00:30,160
‫Try to give a text file as the destination hosts list, start the scan.

7
00:00:31,170 --> 00:00:38,040
‫And analyze the results, so you've made it to the end of the course, but before you run out testing

8
00:00:38,040 --> 00:00:42,780
‫every single network you can find, let's remember what we learned in this course.

9
00:00:44,430 --> 00:00:50,160
‫Firstly, we learned how to prepare the lab environment, how to download and set up Métis voidable

10
00:00:50,160 --> 00:00:51,360
‫to to compromise.

11
00:00:53,080 --> 00:00:56,590
‫Scan types, passive scans and active scans.

12
00:00:57,570 --> 00:01:04,740
‫Perform some passive scans using Wireshark and our tables, the fundamentals of the TCP IP family with

13
00:01:04,740 --> 00:01:10,860
‫the basics of TCP and UDP protocols, active scan in detail using Inmet.

14
00:01:12,780 --> 00:01:19,560
‫The most important and maps, maps, times, no port scan, also known as Say It with me being scan

15
00:01:20,460 --> 00:01:28,080
‫since scan TCP scan and UDP scan comparison of the SIN scan and the TCP scan.

16
00:01:30,180 --> 00:01:32,320
‫What about the details of port scanning?

17
00:01:32,970 --> 00:01:37,490
‫We also learned about the service and the version detection and why that's important.

18
00:01:39,700 --> 00:01:46,340
‫And how did it affect the operating system of a host, the details of input and output management and

19
00:01:46,340 --> 00:01:46,780
‫then Matt?

20
00:01:47,810 --> 00:01:52,190
‫And map scripting engine or NSC performing script scans.

21
00:01:53,840 --> 00:01:55,220
‫Some important scripts.

22
00:01:56,620 --> 00:01:59,170
‫And timing and map scams.

23
00:02:03,050 --> 00:02:06,650
‫We also learned about bypassing IEDs and GPS devices.

24
00:02:08,870 --> 00:02:11,000
‫And remember some of the other and map scans.

25
00:02:12,340 --> 00:02:17,980
‫NULL scan, Fyn scan, Christmas scan, x scan, idol scan.

26
00:02:19,590 --> 00:02:22,140
‫We also went into the definition of vulnerability.

27
00:02:23,120 --> 00:02:26,210
‫And then scanning vulnerabilities with Nessus.

28
00:02:27,500 --> 00:02:34,220
‫We went over how to download, install and run Nessus on Collee and how to perform an Nessus vulnerability

29
00:02:34,220 --> 00:02:37,220
‫scan and export the result reports.

30
00:02:38,500 --> 00:02:43,870
‫And that about does it for me, I really hope you enjoy the course and I hope to see you in another

31
00:02:43,870 --> 00:02:45,250
‫cybersecurity course.

32
00:02:45,850 --> 00:02:47,530
‫Until then, stay safe, my friends.

