Port Scanning Attack

Port Scanning Attack

Learn about port scanning techniques and mitigation options in this module.

rate limit

Code not recognized.

About this course

By the end of this module, you will be able to:
1) Describe a port scan attack
2) Recall the major variations of port scanning attacks
3) Outline best practices to mitigate a port scanning attack

Course Contents3 min

  • Port Scanning Attack

    Port Scanning Attack video

  • Port Scanning Attack Video 3 min
  • Additional Resources

    Links to ExtraHop Documentation and/or relevant articles

  • Additional Resources
  • Port Scanning Attack Quiz

    Port Scanning Attack knowledge check quiz

  • Port Scanning Attack Quiz

About this course

By the end of this module, you will be able to:
1) Describe a port scan attack
2) Recall the major variations of port scanning attacks
3) Outline best practices to mitigate a port scanning attack

Course Contents3 min

  • Port Scanning Attack

    Port Scanning Attack video

  • Port Scanning Attack Video 3 min
  • Additional Resources

    Links to ExtraHop Documentation and/or relevant articles

  • Additional Resources
  • Port Scanning Attack Quiz

    Port Scanning Attack knowledge check quiz

  • Port Scanning Attack Quiz