Nmap: Professional Network Scanning
What you'll learn
- Gain critical skills to become a penetration tester, ethical hacker, and security professional
- You will become skilled at testing your network security using one of the most powerful network security tools available
- Learn how to rapidly and safely scan networks for undiscovered hosts and services
- Learn the basics of the Nmap Scripting Engine (NSE) and start to build your own NSE scripts
- You will know the details of how Nmap works and apply them to real world scanning situations
- Perform network scanning safely and effectively
Requirements
- Students should have the knowledge and ability to setup virtual machines to run Nmap on and to scan against.
- Basic familiarity with the Linux command line is extremely helpful
- A computer system with the sufficient hardware resources to run one to two virtual machines. 4GBs of memory is a minimum and 8GBs is recommended.
Description
What is this course about?
You will become an expert using the most powerful and flexible network scanner available. Nmap is the scanner that other scanners are measured against and you will know how to use it from start to finish.
This course will start off with the basics of network scanning with Nmap and move into how you can use it safely and effectively in your network. You will use practical examples and demonstrations to learn how to use Nmap right now!
Why should you take this course?
This course is based on real experiences using Nmap in network security tests on a huge variety of networks. When you are done, you will have the information you need to safely and effectively scan networks for vulnerabilities, services, and hosts. You will start out at the very basics and work your way up to writing your own basic Nmap Scripting Engine (NSE) scripts.
You will learn a core tool that will help you become a more effective:
penetration tester
ethical hacker
security professional
systems administrator
IT professional
Nmap is an incredibly powerful tool that you can use to troubleshoot network issues, find unknown network services, and vulnerabilities.
What students are saying:
"Superb. Covers the subject very nicely with no wasted dialog."
- James B.
"You present the ideas well, you have a good voice to listen to, you give clear explanations, your video resolution is excellent, and your reference material is excellent."
- Pamela D.
"Being new to IT and pentesting, this course was both informative and practical. I learned more than I though I would about Nmap and its many many features. Looking forward to more courses offered by this teacher/company. Thank you!"
- Matthew K.
Some of the topics include:
Getting and installing Nmap
Port scanning basics with Nmap
Safe scanning techniques
Performance and tuning considerations
Nmap Scripting Engine
Writing NSE scripts
When you complete this course, you will have gone from the basics of Nmap to how to customize your scans to solve some of the different problems you will face in doing network scans.
Who this course is for:
- Systems administrators, network administrators, network security admins
- IT professionals and developers
- Security enthusiasts and those curious about discovering hosts on networks
Featured review
Instructor
Jason Wood is the founder of Paladin Security and a senior researcher on CrowdStrike’s OverWatch R&D team. His research focuses on finding new ways to hunt threat actors and disrupt their operations. His experience has encompassed threat hunting, penetration testing, security operations, and technical operations. Jason is also a contributing author to industry reports on the state of threat actor operations.
Jason is a co-host of the Security Weekly News podcast and provides commentary each week on the security news. He enjoys speaking publicly and has spent a number of hours in front of an audience at conferences such as Fal.con, Derbycon, MIRcon, Security BSides, SAINTCON, and others. He has written and taught courses in penetration testing and security operations.
Jason currently is certified in incident handling (GCIH), cyber threat intelligence (GCTI), network penetration testing (GPEN), cloud penetration testing (GCPN), and Python (GPYC).