Nmap: Network Scanning Basics and Advanced Techniques
4.3 (127 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1,078 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Nmap: Network Scanning Basics and Advanced Techniques to your Wishlist.

Add to Wishlist

Nmap: Network Scanning Basics and Advanced Techniques

Learn to use this powerful scanner as a security pro and build your skills!
4.3 (127 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1,078 students enrolled
Created by Jason Wood
Last updated 6/2017
Current price: $20 Original price: $35 Discount: 43% off
30-Day Money-Back Guarantee
  • 4 hours on-demand video
  • 3 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Build your skills with one of the most popular network security tools in use today
  • Learn how to rapidly assess networks for undiscovered hosts and services
  • Perform network scanning safely and effectively
View Curriculum
  • Students should have the knowledge and ability to setup virtual machines to run Nmap on and to scan against.
  • Basic familiarity with the Linux command line is extremely helpful
  • A computer system with the sufficient hardware resources to run one to two virtual machines. 4GBs of memory is a minimum and 8GBs is recommended.

What is this course about?

Nmap: Network Scanning Basics and Advanced Techniques covers how to use one of the most powerful and flexible network scanners available. It is the scanner that other scanners are measured against. This course will start off with the basics of network scanning with Nmap and move into how you can use it safely and effectively in your network. We will use practical examples and demonstrations to show how you can use Nmap right now!

Some of the topics include:

  • Getting and installing Nmap
  • Port scanning basics with Nmap
  • Reading, analyzing and saving scan output
  • Types of Nmap port scans and when to use them
  • Under the hood of Nmap and how it works
  • Host discovery scanning
  • Operating system discovery
  • Service detection scans
  • Safe scanning techniques
  • Performance and tuning considerations
  • Nmap Scripting Engine
  • Writing NSE scripts

When you complete this course, you will have gone from the basics of Nmap to how to customize your scans to solve some of the different problems you may be facing with your network.

What students are saying:

"You present the ideas well, you have a good voice to listen to, you give clear explanations, your video resolution is excellent, and your reference material is excellent."

- Pamela D.

"Being new to IT and pentesting, this course was both informative and practical. I learned more than I though I would about Nmap and its many many features. Looking forward to more courses offered by this teacher/company. Thank you!"

- Matthew K.

"Superb. Covers the subject very nicely with no wasted dialog."

- James B.

Why should you take the course?

This course is based on real experiences using Nmap in security tests on a huge variety of networks. I've been using Nmap for years as a systems administrator and now as penetration tester. I am constantly assessing networks and trying to find the hosts and systems that in networks that I've never seen before. I may have a week to go through a network with the possibility of tens of thousands of hosts and no documentation available to me. Because of this, I've had to learn how to get the most out of Nmap and do so in a way that does not disrupt my clients' networks. This is the experience that I am sharing with you in this course!

Who is the target audience?
  • This course is for anyone responsible for maintaining networks, assessing network security and needs to monitor their environments for new systems. It is for folks who need to get up to speed on the basics of Nmap and want to push beyond them into some of the more advanced scanning techniques.
Curriculum For This Course
21 Lectures
Getting Started
5 Lectures 36:29
  • What problems Nmap works to solve
  • Over view of what you will learn in this course
  • What resources will you need to complete this course
Preview 06:41

Need help or have a question? Please use the contact information in the PDF.

Contact Information
1 page

I cannot offer any legal advice, but in this video we will go over what the most common "rules of thumb" in use by security experts are. Everything in this section will focus on USA law. Be safe and do your research on your country/state/province's laws are before using security tools!

Preview 07:25

  • IP addresses and versions
  • Network ports
  • TCP protocol
  • UDP protocol
  • What an "open" port is and what it tells us
Preview 12:18

  • Nmap's history
  • Interfaces to Nmap
  • Operating systems compatability
Preview 10:05
Time to Scan!
7 Lectures 01:04:35
  • Review some sources of help available to help you better use Nmap
Getting Help

  • Run some basic network scans with Nmap
  • Specify ports and ranges of ports to scan
  • Specify target hosts and network ranges to scan
  • Common configuration options and when to use them
Run Your First Nmap Scan

  • Read and understand Nmap output
  • Correctly interpret the 6 port states that Nmap will report
  • Reviewing several different scan results
Reading Nmap Output

  • Understand the 3 types of output files that Nmap uses
    • .nmap files
    • .gnmap files
    • XML files
  • How to specify which type of files Nmap will save to
  • How to use the output files
  • Why save scan results?
Saving Nmap Output

  • Learn how Nmap works through a scan configuration
  • Learn which order different scan phases occur in
  • How to use this information in troubleshooting scan results
Understanding the Different Phases of Nmap Scanning

  • Learn how to scan IPv6 addresses using Nmap
  • Review some of the reasons why you would want to scan IPv6 addresses
Preview 04:01

  • Know when you need to run your scans with administrative privileges
Privileges Required for Scanning
Advanced Scan Types, Techniques and Performance Tuning
7 Lectures 01:13:47
  • Why do host discovery scans
  • Options to use for host discovery scans
  • How does Nmap determine whether a host is online?
Host Discovery Scans

  • How Nmap determines the operating system of a remote host
  • Which options to use for operating system discovery scans
Operating System Detection Scans

  • How Nmap determines the type of service running on an open port
  • Which options to use for service discovery scanning
Service Analysis Scans

  • SYN scan
  • TCP connect scan
  • UDP scan
  • TCP Idle scanning
  • IP protocol scan
  • and a few other scan types...
Port Scanning Techniques

  • Speed considerations
  • Bandwidth limits
  • UDP scanning issues
  • Options to use to improve performance or limit impact to the network
Nmap Performance Tuning

  • What is the Nmap Scripting Engine?
  • Why do we need the NSE?
  • How to use NSE scripts
  • Categories of scripts available
The Nmap Scripting Engine

  • How to apply and practice what you have learned
  • Topics for further study and experimentation
  • A few final tips from the school of experience
Conclusion: Where to Next?
Bonus Modules!
2 Lectures 53:13

Do you want to learn how to write your own NSE scripts?  Then let's get started by taking a look at some basics of the Lua scripting language!

NSE Scripting: Some Lua Basics

Let's take a look at the how NSE scripts are written and write some initial scripts!

Writing Basic NSE Scripts
About the Instructor
Jason Wood
4.3 Average rating
125 Reviews
1,078 Students
1 Course
Penetration Tester & Security Consultant

Jason Wood is security consultant with over 15 years of systems administration and security experience with the Windows and UNIX/Linux operating systems. His current job allows him to hack networks, web apps and other crazy stuff. He has spent most of his career in security, application and infrastructure roles.

Jason enjoys presenting on security topics at conferences and in classes. He has presented at Derbycon, MIRcon, OpenWest, SAINTCON and several Security BSides conferences. He has taught classes on penetration testing, security operations and vulnerability assessments.

In his free time, Jason enjoys giving back to his community by working with teenagers as a CyberPatriot mentor and a member of the Civil Air Patrol. The enthusiasm of these young men and women keeps him fired up as they learn about computer security, service and leadership.