A Beginner's Guide to Nmap - Security Scanner
2.8 (30 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
1,217 students enrolled

A Beginner's Guide to Nmap - Security Scanner

Learn How To Build an Nmap Network Scanner from Scratch and Use Nmap for Penetration Testing by eTraining Firm
2.8 (30 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
1,217 students enrolled
Created by eTraining Firm
Last updated 8/2016
English
Current price: $11.99 Original price: $19.99 Discount: 40% off
1 day left at this price!
30-Day Money-Back Guarantee
This course includes
  • 37 mins on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to Udemy's top 3,000+ courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • How to use nmap as network scanner
  • Apply various command options and understand how each phase of an nmap scan works

  • Build your skills with one of the most popular network security tools in use today

  • Learn how to rapidly assess networks for undiscovered hosts and services
  • Perform network scanning safely and effectively
Requirements
  • abc
  • A learning mind
  • A computer with nmap installed
  • Basic familiarity with the Linux command line is extremely helpful
Description

In this Nmap training we will cover and explain you how to use nmap for various types of network scans.

Topics Included:

  • Introduction to NMAP
  • Why this Course
  • Network basics
  • Nmap Installatin & customisation
  • Disclaimer
  • Zenmap and Nmap
  • Port and Target Selection
  • Port Scanning Types
  • Service and OS Detection
  • Port Scanning output
  • Port Scanning Advance
  • Nmap and Zenmap Conclusion
  • Advance Courses
  • More Courses Offers

After completion of this course, we are hoping that you may have the better understanding of Nmap and may be able to perform your scan to fix problem related to your network.


Why should you take the course?


  • How safe is your network?
  • Are you tired of finding security holes?
  • AFTER the systems have been attacked?
  • Have you ever wondered what the bad guys see when they hunt around on your network?
  • Have you always wanted to use Nmap to its full capabilities,but didn’t know where to start?


If you still want to get answers to these questions, then we will suggest you guys to take this course to find out more about nmap.

Adding a final topping to this, all of our training courses come with a 30 Days money back guarantee with NO question asked, apart from, if it is purchased on apple app store. We want our trainees to be satisfied about our training courses all the time.

Also, please take advantage of the free previews sessions to explore what you will get.

After successful completion of this course you will know how to use Nmap effectively.


Who this course is for:
  • A person interested into learning how to protect networks from hackers
  • A person interested in learning about network penetration testing
  • Network Administrators
  • Network Engineers
  • IT Students
  • Industry Experts to brushup their skills
Course content
Expand all 14 lectures 36:48
+ Training Module - 1 Introduction to Nmap
5 lectures 10:04

1.    Introducation to Nmap

2.    Why this Course is Important

3.    Networks Basic

4.    Nmap Basics and Getting Nmap

Preview 00:54

Nmap is a multipurpose tool, and it can be run on many different operating systems including Windows, Linux, BSD, and Mac. Nmap is a very powerful utility that can be used to:

  • Detect the live host on the network (host discovery)
  • Detect the open ports on the host (port discovery or enumeration)
  • Detect the software and the version to the respective port (service discovery)
  • Detect the operating system, hardware address, and the software version
  • Detect the vulnerability and security holes (Nmap scripts)
Preview 01:41

The purpose of this Course is to introduce a user to the Nmap command line and Zenmap tool to scan a host and/or network, so to find out the possible vulnerable points in the hosts.

Purpose & Common Questions

Local Networks

Operating system

Ports

Infected systems

Unauthorised Servers

Organisation Benchmark


Hackers way of attack


Port

Special Packets

Vulnerability

Wrong Direction

Close Ports





Preview 02:35

The network operates by connecting computers and peripherals using two pieces of equipment; switches and routers. Switches and routers, essential networking basics, enable the devices that are connected to your network to communicate with each other, as well as with other networks.

Preview 02:46

Use the operating system that works for you. Nmap will run on a Windows system, however it generally works better and is faster under Linux so that would be my recommended platform. In addition having experience with Linux based systems is a great way to get access to a wide selection of security tools. we are going for Linux because namp is already install on kali linux.

Preview 02:08
+ Training Module - 2 Demonstration
6 lectures 24:00

This information is provided to assist users of Nmap in scanning their own networks, or networks for which they have been given permission to scan, in order to determine the security of such networks.

Preview 00:37

Zenmap is the GUI for the very popular free port scanner Nmap. It comes pre-loaded with 10 different scan types which we will take closer look at them in this article. 


202 - Zenmap and Nmap
05:35

Scanning a single IP & Port, a Host, range of IPs & Ports, a subnet.

203 - Port and Target Selection
05:19

Service and OS detection rely on different methods to determine the operating system or service running on a particular port. The more aggressive service detection is often helpful if there are services running on unusual ports. On the other hand the lighter version of the service will be much faster as it does not really attempt to detect the service simply grabbing the banner of the open service.

 

204 - Port Scanning Types
04:20
205 - Service and OS Detection
03:20
206 - Port Scanning output
04:49
+ Training Module - 3 Conclusion and Bonuses
2 lectures 01:53

Nmap and Zenmap is a very powerful tool and it has ability to cover the very first aspects of penetration testing, which include information gathering and enumeration. This Course is designed for Penetration tester to use Nmap from the beginner level to the advanced level. There are so many other things that you can do with the Nmap, and we will discuss in our future courses.

301 - Conclusion
01:09
302 - Last Video n Other free Courses
00:44
+ Training Module - 4 - Bonus For Existing Stuednts
1 lecture 00:51

Join this course to unlock discount for our other courses, Exclusive to existing students

401 - Bonus Plus Discount
00:51