Learning Object
Learning Object image

Port Scanning


Author: Joseph Wetzel
Subject: IT Security
Source: Wisc-Online
Creative Commons Attribution-NonCommercial Image

Share

Description
In this learning activity you'll explore how port scanning is commonly used by hackers to infiltrate a network and how IT security professionals can detect it.

Items related to the subject IT Security