Learning Object
Learning Object image

Port Scanning

Author: Joseph Wetzel
Subject: IT Networking
Source: Wisc-Online
Creative Commons Attribution-NonCommercial Image


In this learning activity you'll explore how port scanning is commonly used by hackers to infiltrate a network and how IT security professionals can detect it.

Items related to the subject IT Networking