Lesson 7
Scanning, Sniffing, Spoofing and Man-in-the-middle Attacks Lesson 13.
Scanning and Spoofing Lesson 7. Scanning Ping Sweeps Port Scanners Vulnerability Scanning tools.
Computer Security Fundamentals by Chuck Easttom Chapter 6 Techniques Used by Hackers.