Network security starts with one deceptively hard question: what is actually here? This course teaches discovery and asset inventory the way it's really practiced — as measurement under uncertainty, not button-pushing. Each chapter pairs concepts with a tool you can run on a simulated network and your own.
Find devices with passive and active methods. Learn existence vs. identity, the discovery gap, and why completeness and soundness must be judged together. Run it on a simulated network, then your own.
Turn "probably a Hikvision" into a confident device identity using corroborating signals — banners, protocols, OUI, and behavior.
Map identified devices to CVEs, default credentials, and firmware age. Detective analytics built on a sound inventory.
Predictive analytics: how an attacker chains exposures across the devices you found into a path through the network.
Every chapter has three parts: Lessons (the concepts, drawn from real lab exercises), a Learn mode (a simulated network with known ground truth, so you can measure how much you found), and a Scan Mine mode (run real, safe discovery commands on your own network and analyze the results in your browser). Nothing you scan ever leaves your device.