The Complete Nmap Ethical Hacking Course : Network Security
4.7 (106 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1,827 students enrolled
Wishlisted Wishlist

Please confirm that you want to add The Complete Nmap Ethical Hacking Course : Network Security to your Wishlist.

Add to Wishlist

The Complete Nmap Ethical Hacking Course : Network Security

Become an expert in the ethical hacking and network security tool Nmap!
Best Seller
4.7 (106 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1,827 students enrolled
Created by Nathan House
Last updated 8/2017
English
Current price: $10 Original price: $100 Discount: 90% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 4.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • You will become an expert in using Nmap for ethical hacking, system administration and network security.
  • Learn how to successfully discover active and vulnerable hosts on a network.
  • Discover the secrets of ethical hacking and network discovery, using Nmap on this complete course.
  • You will explore the Nmap Scripting Engine (NSE) used for more advanced discovery and hacking. We look at many scripts including those used for brute forcing passwords in email and databases, cross-site scripting (XSS) and SQL injection (SQLi) discovery and other cool Nmap scripts.
  • Learn Firewall and Intrusion detection evasion, Nmap output (convert, merge and compare) results, Zenmap (Nmap GUI) and how criminal black hat hackers use Nmap.
  • Scan to determine firewall rules while avoiding intrusion detection systems (IDS).
  • You will understand how Nmap is used in combination with criminal hacking infrastructures (command and control) servers.
  • Importantly we cover the both the command line version of Nmap and the GUI version of Nmap called Zenmap.
  • Plus I include some great extra bonuses, like useful bash scripts to use with Nmap and an amazing cheat sheet to easily remember complex commands.
  • You will explore Nmap Installation, Hacking Labs, Network and port scanner basics, Target selection, Port states, Host discovery, Scan techniques and Port selection.
  • You will master Service detection, Version detection, Operating system detection, and optimizing Timing and performance.
View Curriculum
Requirements
  • A basic understanding of using operating systems, networks, TCP/IP and the Internet.
  • A willingness to learn.
  • Nmap can be used on Windows, Mac, Linux, BSD and many other platforms.
Description

Welcome to the Complete Nmap Course!

Nmap is the Internets most popular network scanner with advanced features that most people don't know even exists!

Discover the secrets of ethical hacking and network discovery, using Nmap on this complete course.

Nmap is an indispensable tool that all techies should know well. It is used by all good ethical hackers, penetration testers, systems administrators, and anyone in fact who wants to discovery more about the security of a network and its hosts.

You cannot be a good ethical hacker or systems administrator without being an expert in Nmap.

You will go from beginner to expert in easy to follow structured steps - and we cover all major platforms that Nmap can be used on, including - Windows, Mac, Linux and Kali.

The ideal student for this course is technically minded with an interest in ethical hacking and network security

At the end of this course you'll have a practical skill-set in using Nmap to scan networks. You will be able to find vulnerabilities and weaknesses on systems that can be exploited by hackers.

Who is the target audience?
  • Anyone interested in network security and ethical hacking.
  • Techies, ethical hackers, penetration testers and systems administrators.
  • Those wanting to become ethical hackers, penetration testers and systems administrators.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
55 Lectures
04:25:42
+
Cheat Sheet
1 Lecture 01:07
Nmap Cheat Sheet
01:07
+
Installing Nmap and Cloud Labs
3 Lectures 13:40
Goals and Learning Objectives
00:39

How to Install Nmap
09:25

Cloud Based Hacking Lab
03:36
+
Nmap Basics, Target Specification & Port States
5 Lectures 14:58
Goals and Learning Objectives
00:21

An Introduction to Port Scanning and Fingerprinting
02:17

Nmap Basics
03:38

Nmap Target Specification
05:13

Nmap Port states
03:29
+
Nmap Discovery and Ping Scanning
5 Lectures 17:13
Goals and Learning Objectives
00:19

Nmap Discovery - Part 1
04:24

Nmap Discovery - Part 2
03:52

Nmap Discovery - Part 3
04:10

Nmap Discovery - Part 4
04:28
+
Nmap Scan Techniques
5 Lectures 18:52
Goals and Learning Objectives
00:19

Nmap Scan Techniques - SYN and Connect
06:09

Nmap Scan Techniques - UDP and SCTP
05:50

Nmap Scan Techniques - TCP ACK and Window
01:48

Nmap Scan Techniques - NULL, FIN, Xmas, Maimon Idle Scan and IP Protocol
04:46
+
Nmap Port Specification, Service, Version & OS Detection
4 Lectures 20:18
Goals and Learning Objectives
00:20

Nmap Port Specification
05:18

Nmap Service and Version Detection
06:48

Nmap OS Detection
07:52
+
Nmap Scripting Engine (NSE)
6 Lectures 39:23
Goals and Learning Objectives
00:25

Nmap Scripting Engine (NSE) Part 1 - Categories
07:35

Nmap Scripting Engine (NSE) Part 2 - Usage and Cool Scripts
08:07


Nmap Scripting Engine (NSE) Part 4 - Usage and Cool Scripts
10:01

Writing Nmap Scripting Engine (NSE) Scripts
04:00
+
Nmap Performance, Firewall and IDS Evasion
4 Lectures 15:33
Goals and Learning Objectives
00:19

Nmap Timing and Performance
04:19

Nmap Firewall / IDS Evasion and Spoofing Part 1
05:48

Nmap Firewall / IDS Evasion and Spoofing Part 2
05:07
+
Nmap Output and Extras
4 Lectures 16:13
Goals and Learning Objectives
00:24

Nmap Output
07:15

Nmap Output & Miscellaneous Options
04:49

Extras
03:45
4 More Sections
About the Instructor
Nathan House
4.6 Average rating
8,076 Reviews
42,318 Students
5 Courses
Leading Cyber Security Expert

I have over 24 years experience in cyber security where I have advised some of largest companies in the world, assuring security on multi-million and multi-billion pound projects. I am the CEO of Station X a cyber security consultancy. More recently I acted as the lead security consultant on a number of the UKs mobile banking and payment solutions helping secure to date over £71Bn in transactions.

My clients have included; BP, ExxonMobil, Shell, Vodafone, VISA, T-mobile, GSK, COOP Banking Group, Royal Bank of Scotland, Natwest, Yorkshire bank, BG Group, BT, London 2012.

Over the years I have spoken at a number of security conferences, developed free security tools, and discovered serious security vulnerabilities in leading applications.

Qualifications and education

★ BSc. (Hons) Computing 'Networks & Communication' 1st Class Honors
★ SCF : SABSA Chartered Architect Foundation
★ CISSP : Certified Information Systems Security Professional
★ CISA : Certified Information Systems Auditor
★ CISM : Certified Information Security Manager
★ ISO 27001 Certified ISMS Lead Auditor
★ CEH : Certified Ethical Hacker
★ OSCP : Offensive Security Certified Professional