Ethical Hacking - The Most Advanced Level NMAP Course
3.8 (202 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
17,954 students enrolled

Ethical Hacking - The Most Advanced Level NMAP Course

Complete network security course, Learn network penetration testing using nmap, Advanced level NMAP course
3.9 (202 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
17,954 students enrolled
Created by Vishal Patel
Last updated 6/2019
English
Current price: $139.99 Original price: $199.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 2.5 hours on-demand video
  • 1 article
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Students will learn to scan entire computer network in their organization or company
  • Students will learn network scanning of ethical hacking
  • Students will learn about NMAP
  • Objective of network scanning
  • To find live hosts,ports,ip address of live host
  • To discover operating system on target host
  • To discover services running on hosts
  • To find vulnerabilities
  • What is ping
  • What is ping sweep
  • Three-way handshake
  • TCP communication flag
  • Different type of scanning concepts
  • TCP based scanning
  • UDP based scanning
  • Preparing lab setup at your home
  • Host discovery
  • Port scanning basics
  • Port scanning techniques
  • Port specification and scan order
  • Service and version detection
  • OS detection
  • NMAP scripting engine
  • Timing and performance
  • Firewall/IDS evasion and spoofing
Requirements
  • Students must have knowledge about computer networks
  • Computer network security knowledge will be advantage
Description

In this course you will learn about network penetration testing using NMAP. NMAP is most popular tool in ethical hacking world. This tool is widely use by Penetration Testers, Ethical Hackers, System Administrators, Network Engineers. This tool has great capability to gather information about computer networks. In this course you will learn from lab setup to complete network scanning using NMAP. In this course i will guide you step by step to setup lab and use  NMAP. This course will give you complete knowledge about network scanning. After completion of this course you will be able to find weaknesses and vulnerabilities of network. This course is complete ethical hacking based course. To be a good ethical hacker, you must have knowledge about NMAP. In this course i am using kali linux as platform to demonstrate all the lectures. This course will give you complete knowledge about full scan,half scan,three-way handshake process,FIN scan,XMAS scan,TCP scan,UDP scan,IDLE scan, Null Scan. This course will help a lot to those who are already working as IT professionals and who wants to start their career in the field of penetration testing or ethical hacking. Network scanning is a most important phase of ethical hacking. In this course you will learn complete network scanning using open source based tools.

One of the most important feature that Nmap has ability to detect remote operating systems and software. It is very helpful during a Ethical Hacking to know about the operating system and the software used by the remote computer because you can easily predict the known vulnerabilities from this information.

Who this course is for:
  • Network Engineer
  • System Administrators
  • Hardware Engineer
  • Computer Science Student
  • Computer network known
  • Hardware and network engineers
  • Datacenter Engineer
Course content
Expand all 38 lectures 02:40:51
+ Introduction about network scanning concepts
4 lectures 05:08

In this lecture you will learn about network scanning definition.

Preview 00:53

In this lecture you will understand complete theory concept of finding live devices on the computer network.

Preview 01:09

In this lecture you will learn concept of about how to gather live hosts information using subnet.

How to get live host devices information using subnet or range of ip addresses
01:02

In this lecture you will learn about three-way handshake process.

Understanding about three way handshake process
02:04
+ Prepare lab setup at your home
6 lectures 32:04

In this video you will learn to download vmware workstation player with safety.

How to download vmware workstation player
02:06

In this video you will learn how to install vmware workstation player into your pc.

How to install vmware workstation player
03:41

In this video you will learn how to deploy metasploitable 2 into virtualization environment, What is metasploitable, what is vmware workstation software, how to use metasploitable etc..

Preview 04:57

In this video you will learn how to download kali linux's image file.

Preview 01:20

In this video you will learn to deploy kali linux stepwise.

Preview 14:35

In this video you will learn to install vmware tools in kali linux.

Preview 05:25
+ Nmap Overview
1 lecture 01:17

In this lecture you will learn about complete introduction of nmap.

Nmap Introduction
01:17
+ Host Discovery
17 lectures 01:10:21

In this lecture you will learn about host discovery quick idea.

Overview of host discovery
00:43

In this lecture you will learn to check ip addresses of each machines and perform ping test , wireshark configurations and windows firewall configurations.

Lets perform ping test
10:22

In this lecture you will learn how to get important information about target by running simple nmap command.

Specifying target host in nmap command
01:59

In this video lecture you will learn to specifying target networks using nmap and get information about it.

Specifying target networks in nmap command
07:48

In this lecture you will learn more advanced level options than previous lecture.

Specifying target hosts and networks more advanced level
07:30

In this lecture you will learn to get dns record information about target organization.

Finding an organization's ip address
03:19

In this lecture you will learn to setup dns server and dns server's record. This video lecture will guide you to prepare DNS lab at your home so you don't need to perform it on internet accidentally.

Setting up dns server and creating some dns records
09:28

In this video lecture you will learn zone transferring in our own lab. You will also learn common mistake done by system administrator in dns configurations which leads dns based attack.

Zone transfer practice in our own lab
11:57

In this lecture you will learn to find ip address associated with the domain name, ports information, traceroute information.

Nmap Reverse-DNS and traceroute
03:20

In this lecture you will learn about list scan. List scan gives you surity that you have proper Ip addresses for your organization.

List Scan
02:34

In this lecture you will learn how to perform reconnaissance of a target network quickly and without attracting much attention.

Disable port scan
01:49

In this lecture you will learn about disable ping scan.

Disable ping scan
03:30

In this lecture you will learn to send ICMP echo request using nmap.

ICMP echo request using nmap
00:50

In this lecture you will learn about TCP SYN ping.

TCP SYN ping
01:05

In this lecture you will learn about send ACK ping using nmap and discover host.

Attempted ACK Ping
01:17

In this lecture you will understand about UDP ping.

UDP Ping
00:20

In this lecture you will learn to discover host using ARP Scanning.

ARP Scan
02:30
+ Port Scanning Using Nmap
10 lectures 52:01

In this lecture you will learn about introduction of port scanning.

Introduction to port scanning
04:56

In this lecture you will learn simple command of nmap and get effective result.

Nmap simple command
04:35

In this lecture you will learn to get information about large network by scanning tcp port.

Scan a large computer network for a certain open TCP port part 1
10:00

In this lecture you will learn to get information about large network by scanning tcp port.

Scan a large computer network for a certain open TCP port part 2
08:55

In this lecture you will learn about tcp connect scan.

TCP connect scan
05:03

In this lecture you will learn about TCP SYN, FIN, NULL and XMAS Scans

TCP SYN, FIN, NULL and XMAS Scans
04:46

In this lecture you will learn about custom SYN/FIN scan.

Custom SYN/FIN scan
02:41

In this lecture you will learn about TCP ACK scan

TCP ACK scan
01:15

In this lecture you will learn about TCP windows scan.

TCP windows scan
01:01

In this lecture you will learn about IDLE scan in depth.

IDLE Scanning
08:49