What is this course about?
Nmap: Network Scanning Basics and Advanced Techniques covers how to use one of the most powerful and flexible network scanners available. It is the scanner that other scanners are measured against. This course will start off with the basics of network scanning with Nmap and move into how you can use it safely and effectively in your network. We will use practical examples and demonstrations to show how you can use Nmap right now!
Some of the topics include:
When you complete this course, you will have gone from the basics of Nmap to how to customize your scans to solve some of the different problems you may be facing with your network.
What students are saying:
"You present the ideas well, you have a good voice to listen to, you give clear explanations, your video resolution is excellent, and your reference material is excellent."
- Pamela D.
"Being new to IT and pentesting, this course was both informative and practical. I learned more than I though I would about Nmap and its many many features. Looking forward to more courses offered by this teacher/company. Thank you!"
- Matthew K.
"Superb. Covers the subject very nicely with no wasted dialog."
- James B.
Why should you take the course?
This course is based on real experiences using Nmap in security tests on a huge variety of networks. I've been using Nmap for years as a systems administrator and now as penetration tester. I am constantly assessing networks and trying to find the hosts and systems that in networks that I've never seen before. I may have a week to go through a network with the possibility of tens of thousands of hosts and no documentation available to me. Because of this, I've had to learn how to get the most out of Nmap and do so in a way that does not disrupt my clients' networks. This is the experience that I am sharing with you in this course!
Need help or have a question? Please use the contact information in the PDF.
I cannot offer any legal advice, but in this video we will go over what the most common "rules of thumb" in use by security experts are. Everything in this section will focus on USA law. Be safe and do your research on your country/state/province's laws are before using security tools!
Jason Wood is security consultant with over 15 years of systems administration and security experience with the Windows and UNIX/Linux operating systems. His current job allows him to hack networks, web apps and other crazy stuff. He has spent most of his career in security, application and infrastructure roles.
Jason enjoys presenting on security topics at conferences and in classes. He has presented at Derbycon, MIRcon, OpenWest, SAINTCON and several Security BSides conferences. He has taught classes on penetration testing, security operations and vulnerability assessments.
In his free time, Jason enjoys giving back to his community by working with teenagers as a CyberPatriot mentor and a member of the Civil Air Patrol. The enthusiasm of these young men and women keeps him fired up as they learn about computer security, service and leadership.