Types Of Scanning In Ethical Hacking And Cyber-Security