A Beginner's Guide to Nmap - Security Scanner
3.9 (27 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1,212 students enrolled
Wishlisted Wishlist

Please confirm that you want to add A Beginner's Guide to Nmap - Security Scanner to your Wishlist.

Add to Wishlist

A Beginner's Guide to Nmap - Security Scanner

Learn How To Build an Nmap Network Scanner from Scratch and Use Nmap for Penetration Testing by eTraining Firm
3.9 (27 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1,212 students enrolled
Last updated 8/2016
Curiosity Sale
Current price: $10 Original price: $20 Discount: 50% off
30-Day Money-Back Guarantee
  • 37 mins on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • How to use nmap as network scanner
  • Apply various command options and understand how each phase of an nmap scan works
  • Build your skills with one of the most popular network security tools in use today
  • Learn how to rapidly assess networks for undiscovered hosts and services
  • Perform network scanning safely and effectively
View Curriculum
  • abc
  • A learning mind
  • A computer with nmap installed
  • Basic familiarity with the Linux command line is extremely helpful

In this Nmap training we will cover and explain you how to use nmap for various types of network scans.

Topics Included:

  • Introduction to NMAP
  • Why this Course
  • Network basics
  • Nmap Installatin & customisation
  • Disclaimer
  • Zenmap and Nmap
  • Port and Target Selection
  • Port Scanning Types
  • Service and OS Detection
  • Port Scanning output
  • Port Scanning Advance
  • Nmap and Zenmap Conclusion
  • Advance Courses
  • More Courses Offers

After completion of this course, we are hoping that you may have the better understanding of Nmap and may be able to perform your scan to fix problem related to your network.

Why should you take the course?

  • How safe is your network?
  • Are you tired of finding security holes?
  • AFTER the systems have been attacked?
  • Have you ever wondered what the bad guys see when they hunt around on your network?
  • Have you always wanted to use Nmap to its full capabilities,but didn’t know where to start?

If you still want to get answers to these questions, then we will suggest you guys to take this course to find out more about nmap.

Adding a final topping to this, all of our training courses come with a 30 Days money back guarantee with NO question asked, apart from, if it is purchased on apple app store. We want our trainees to be satisfied about our training courses all the time.

Also, please take advantage of the free previews sessions to explore what you will get.

After successful completion of this course you will know how to use Nmap effectively.

Who is the target audience?
  • A person interested into learning how to protect networks from hackers
  • A person interested in learning about network penetration testing
  • Network Administrators
  • Network Engineers
  • IT Students
  • Industry Experts to brushup their skills
Students Who Viewed This Course Also Viewed
Curriculum For This Course
Training Module - 1 Introduction to Nmap
5 Lectures 10:04

1.    Introducation to Nmap

2.    Why this Course is Important

3.    Networks Basic

4.    Nmap Basics and Getting Nmap

Preview 00:54

Nmap is a multipurpose tool, and it can be run on many different operating systems including Windows, Linux, BSD, and Mac. Nmap is a very powerful utility that can be used to:

  • Detect the live host on the network (host discovery)
  • Detect the open ports on the host (port discovery or enumeration)
  • Detect the software and the version to the respective port (service discovery)
  • Detect the operating system, hardware address, and the software version
  • Detect the vulnerability and security holes (Nmap scripts)
Preview 01:41

The purpose of this Course is to introduce a user to the Nmap command line and Zenmap tool to scan a host and/or network, so to find out the possible vulnerable points in the hosts.

Purpose & Common Questions

Local Networks

Operating system


Infected systems

Unauthorised Servers

Organisation Benchmark

Hackers way of attack


Special Packets


Wrong Direction

Close Ports

Preview 02:35

The network operates by connecting computers and peripherals using two pieces of equipment; switches and routers. Switches and routers, essential networking basics, enable the devices that are connected to your network to communicate with each other, as well as with other networks.

Preview 02:46

Use the operating system that works for you. Nmap will run on a Windows system, however it generally works better and is faster under Linux so that would be my recommended platform. In addition having experience with Linux based systems is a great way to get access to a wide selection of security tools. we are going for Linux because namp is already install on kali linux.

Preview 02:08
Training Module - 2 Demonstration
6 Lectures 24:00

This information is provided to assist users of Nmap in scanning their own networks, or networks for which they have been given permission to scan, in order to determine the security of such networks.

Preview 00:37

Zenmap is the GUI for the very popular free port scanner Nmap. It comes pre-loaded with 10 different scan types which we will take closer look at them in this article. 

202 - Zenmap and Nmap

Scanning a single IP & Port, a Host, range of IPs & Ports, a subnet.

203 - Port and Target Selection

Service and OS detection rely on different methods to determine the operating system or service running on a particular port. The more aggressive service detection is often helpful if there are services running on unusual ports. On the other hand the lighter version of the service will be much faster as it does not really attempt to detect the service simply grabbing the banner of the open service.


204 - Port Scanning Types

205 - Service and OS Detection

206 - Port Scanning output
Training Module - 3 Conclusion and Bonuses
2 Lectures 01:53

Nmap and Zenmap is a very powerful tool and it has ability to cover the very first aspects of penetration testing, which include information gathering and enumeration. This Course is designed for Penetration tester to use Nmap from the beginner level to the advanced level. There are so many other things that you can do with the Nmap, and we will discuss in our future courses.

301 - Conclusion

302 - Last Video n Other free Courses
Training Module - 4 - Bonus For Existing Stuednts
1 Lecture 00:51

Join this course to unlock discount for our other courses, Exclusive to existing students

401 - Bonus Plus Discount
About the Instructor
eTraining Firm
4.0 Average rating
118 Reviews
6,459 Students
6 Courses
Excel | QuickBooks | Sage | Kali Linux | Ethical Hacking

eTraining Firm is a pioneer in the field of learning, training and talent management with a long history of innovation. eTraining Firm provides training solutions for our customers worldwide, who range from global enterprises, government and education customers to mid-sized and small businesses.

Our courses, books and videos have been developed by industry-leading learning experts to ensure that they build talent and develop a more knowledgeable, productive and valuable workforce.

Courses Included: 

1-Penetration Testing

2-Web Developing


4-Sage 50

5-QuickBooks 2015-2016

6-Microsoft Excel 2013, 2016


8-WordPress and IT.

We currently serve over 10,000 learners worldwide and provide continuing, hands-on support to assist them in maximizing their ongoing success.

All Training courses are hands-on practical training

Muhammad Noman
4.0 Average rating
68 Reviews
3,658 Students
3 Courses
Ethical Hacker, SEO Guru, Web Developer & Penetration Tester

Muhammmad Noman  is a speaker, author and trainer. He has presented keynote speeches, workshops, and seminars in different institute and universities. He is a highly proficient, experienced, and professionally Certified Penetration Tester Engineer and Certified Vulnerability Assessor from Mile2 (USA Awarding Body)

Muhammad Noman is a serial entrepreneur, successfully running RS Stars, mylatesttrick com and eTriningFirm com He is a Security Researcher, SEO Expert, Blogger and Web Developer. He graduated from Bahria University having a Degree in MS (Computer Science) and also SEO Courses.

He has been into security research for more than 6 years now and He works as a Senior Penetration Tester with Maads Security, a firm of penetration testers, otherwise known as ethical hackers, who specialize in helping organizations understand and quantify risk to their business. His core area of expertise include Network Security and Web Application Penetration testing, and author of "WordPress Security Guide" and Publisher of two course which is “Penetration testing Guide” and “Website Security and Exploitation” an in-depth guide to internet security. He has helped securing lots of organization and he is listed in large number of hall of fames including Google, Microsoft, Twitter, Dropbox, Adobe, Apple etc.