Nmap: Network Scanning Basics and Advanced Techniques

Learn to use this powerful scanner as a security pro and build your skills!
4.6 (39 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
365 students enrolled
$19
$35
46% off
Take This Course
  • Lectures 19
  • Length 3 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 2/2016 English

Course Description

What is this course about?

Nmap: Network Scanning Basics and Advanced Techniques covers how to use one of the most powerful and flexible network scanners available. It is the scanner that other scanners are measured against. This course will start off with the basics of network scanning with Nmap and move into how you can use it safely and effectively in your network. We will use practical examples and demonstrations to show how you can use Nmap right now!

Some of the topics include:

  • Getting and installing Nmap
  • Port scanning basics with Nmap
  • Reading, analyzing and saving scan output
  • Types of Nmap port scans and when to use them
  • Under the hood of Nmap and how it works
  • Host discovery scanning
  • Operating system discovery
  • Service detection scans
  • Safe scanning techniques
  • Performance and tuning considerations
  • Nmap Scripting Engine

When you complete this course, you will have gone from the basics of Nmap to how to customize your scans to solve some of the different problems you may be facing with your network.

What students are saying:

"You present the ideas well, you have a good voice to listen to, you give clear explanations, your video resolution is excellent, and your reference material is excellent."

- Pamela D.

"Being new to IT and pentesting, this course was both informative and practical. I learned more than I though I would about Nmap and its many many features. Looking forward to more courses offered by this teacher/company. Thank you!"

- Matthew K.

"Superb. Covers the subject very nicely with no wasted dialog."

- James B.

Why should you take the course?

This course is based on real experiences using Nmap in security tests on a huge variety of networks. I've been using Nmap for years as a systems administrator and now as penetration tester. I am constantly assessing networks and trying to find the hosts and systems that in networks that I've never seen before. I may have a week to go through a network with the possibility of tens of thousands of hosts and no documentation available to me. Because of this, I've had to learn how to get the most out of Nmap and do so in a way that does not disrupt my clients' networks. This is the experience that I am sharing with you in this course!

What are the requirements?

  • Students should have the knowledge and ability to setup virtual machines to run Nmap on and to scan against.
  • Basic familiarity with the Linux command line is extremely helpful
  • A computer system with the sufficient hardware resources to run one to two virtual machines. 4GBs of memory is a minimum and 8GBs is recommended.

What am I going to get from this course?

  • Build your skills with one of the most popular network security tools in use today
  • Learn how to rapidly assess networks for undiscovered hosts and services
  • Perform network scanning safely and effectively

What is the target audience?

  • This course is for anyone responsible for maintaining networks, assessing network security and needs to monitor their environments for new systems. It is for folks who need to get up to speed on the basics of Nmap and want to push beyond them into some of the more advanced scanning techniques.

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Getting Started
06:41
  • What problems Nmap works to solve
  • Over view of what you will learn in this course
  • What resources will you need to complete this course
1 page

Need help or have a question? Please use the contact information in the PDF.

07:25

I cannot offer any legal advice, but in this video we will go over what the most common "rules of thumb" in use by security experts are. Everything in this section will focus on USA law. Be safe and do your research on your country/state/province's laws are before using security tools!

12:18
  • IP addresses and versions
  • Network ports
  • TCP protocol
  • UDP protocol
  • What an "open" port is and what it tells us
10:05
  • Nmap's history
  • Interfaces to Nmap
  • Operating systems compatability
Section 2: Time to Scan!
08:15
  • Review some sources of help available to help you better use Nmap
15:23
  • Run some basic network scans with Nmap
  • Specify ports and ranges of ports to scan
  • Specify target hosts and network ranges to scan
  • Common configuration options and when to use them
08:53
  • Read and understand Nmap output
  • Correctly interpret the 6 port states that Nmap will report
  • Reviewing several different scan results
12:41
  • Understand the 3 types of output files that Nmap uses
    • .nmap files
    • .gnmap files
    • XML files
  • How to specify which type of files Nmap will save to
  • How to use the output files
  • Why save scan results?
09:56
  • Learn how Nmap works through a scan configuration
  • Learn which order different scan phases occur in
  • How to use this information in troubleshooting scan results
04:01
  • Learn how to scan IPv6 addresses using Nmap
  • Review some of the reasons why you would want to scan IPv6 addresses
05:26
  • Know when you need to run your scans with administrative privileges
Section 3: Advanced Scan Types, Techniques and Performance Tuning
05:15
  • Why do host discovery scans
  • Options to use for host discovery scans
  • How does Nmap determine whether a host is online?
06:56
  • How Nmap determines the operating system of a remote host
  • Which options to use for operating system discovery scans
08:47
  • How Nmap determines the type of service running on an open port
  • Which options to use for service discovery scanning
10:20
  • SYN scan
  • TCP connect scan
  • UDP scan
  • TCP Idle scanning
  • IP protocol scan
  • and a few other scan types...
19:24
  • Speed considerations
  • Bandwidth limits
  • UDP scanning issues
  • Options to use to improve performance or limit impact to the network
15:03
  • What is the Nmap Scripting Engine?
  • Why do we need the NSE?
  • How to use NSE scripts
  • Categories of scripts available
08:02
  • How to apply and practice what you have learned
  • Topics for further study and experimentation
  • A few final tips from the school of experience

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Jason Wood, Penetration Tester & Security Consultant

Jason Wood is security consultant with over 15 years of systems administration and security experience with the Windows and UNIX/Linux operating systems. His current job allows him to hack networks, web apps and other crazy stuff. He has spent most of his career in security, application and infrastructure roles.

Jason enjoys presenting on security topics at conferences and in classes. He has presented at Derbycon, MIRcon, OpenWest, SAINTCON and several Security BSides conferences. He has taught classes on penetration testing, security operations and vulnerability assessments.

In his free time, Jason enjoys giving back to his community by working with teenagers as a CyberPatriot mentor and a member of the Civil Air Patrol. The enthusiasm of these young men and women keeps him fired up as they learn about computer security, service and leadership.

Ready to start learning?
Take This Course