Skip navigation

We will update our Privacy Policy soon. Please see the preview.

TCP flags

TCP flags: Ethical Hacking: Scanning Networks
TCP flags: Ethical Hacking: Scanning Networks

TCP flags help tell the story of data transmission. Lisa Bock reviews the different flags used in the TCP header, how flags can be used when scanning the network to get a response, and how flags can help avoid detection of an intrusion detection system (IDS). Discover the techniques used by Nmap, such as Full Connect, SYN Stealth and a XMAS scan.

Resume Transcript Auto-Scroll
Skill Level Intermediate
1h 43m
Show More Show Less
Skills covered in this course
Security IT Linux

Continue Assessment

You started this assessment previously and didn't complete it. You can pick up where you left off, or start over.

Start Your Free Trial Now

Start your free trial now, and begin learning software, business and creative skills—anytime, anywhere—with video instruction from recognized industry experts.

Start Your Free Trial Now