Mastering Nmap

Course

Online

£ 10 VAT inc.

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

A step-by-step tutorial to gain expertise in NmapYou will learn how to use this tool to implement a wide variety of practical tasks related to pentesting and network monitoring. The tutorial will start with installation techniques and then explain Nmap fundamentals. Moving on, we will cover the advanced functionalities of Nmap Scripting Engine (NSE) such as libraries, scripts, APIs, and so on. You will be able to perform custom tasks, the fundamentals of Lua programming, scanning mail servers, scanning databases, windows machines, SCADA systems, and large networks.About The AuthorFotis Chantzis is currently an information security engineer at Mayo Clinic. He has also been a part of the main Nmap development team since 2009, when he wrote Ncrack. He also worked with the author of Nmap when he successfully completed the Google summer code 2010. He also represented Nmap at the Google Mentor Summit in October 2016. He is passionate about computer security and has even has his own startup Primavista.

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

Learn network security concepts that are required to properly comprehend and grasp how all Nmap utilities work the way they do
Handle large numbers of results from scanning large networks
IT administrators can effectively monitor their network for critical changes that might lead to potential vulnerabilities, by comparing the results from everyday scans
Master the Nmap Scripting Engine (NSE) by writing new (and customizing existing) Lua scripts that further extend Nmap's capabilities
Utilize the Nmap suite's accompanying tools to refine and effectively automate your everyday network tasks, including debugging, visualizing, monitoring, and network auditing
Conduct host discovery, port scanning, and version and OS detection for every system in your network

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

This centre's achievements

2021

All courses are up to date

The average rating is higher than 3.7

More than 50 reviews in the last 12 months

This centre has featured on Emagister for 4 years

Subjects

  • Options
  • Networks
  • TCP-IP
  • Works
  • Network
  • Network security
  • IP
  • TCP
  • Network Training
  • Operating System

Course programme

Scanning Your First Target 5 lectures 34:59 The Course Overview This video provides an overview of the entire course. Nmap Primer The aim of the video is to let the viewer get acquainted with Nmap and show them its basic functionality and capabilities.
  • The first step is to walk through a simple example of an Nmap session.
  • Then we learn how to interpret Nmap reports.
  • Finally, we talk about other useful Nmap options.
Network Security Fundamentals The aim of this video is to introduce some fundamental network security concepts that are needed to get a basic understanding of how Nmap works.
  • The first step is to talk about the OSI layer and how packets are exchanged between remote hosts.
  • Then we delve into analyzing the TCP and IP headers.
  • Finally, we walk though how the TCP SYN scan works.
Service Version Detection The aim of this video is to learn how to use Nmap’s Service Version Detection, why it is important and how it works behind the scenes.
  • The first step is to learn by example service scanning of a remote host.
  • Then, we discuss why version detection is important.
  • Finally, we analyze how Nmap’s version detection works behind the scenes.
Operating System Detection The aim of the video is to get acquainted with Nmap’s remote Operating System detection capability.
  • The first step is to learn by example how to conduct a remote OS detection.
  • Then we talk about scenarios where remote OS detection is important.
  • Finally, we summarize how remote OS detection works.
Scanning Your First Target 5 lectures 34:59 The Course Overview This video provides an overview of the entire course. Nmap Primer The aim of the video is to let the viewer get acquainted with Nmap and show them its basic functionality and capabilities.
  • The first step is to walk through a simple example of an Nmap session.
  • Then we learn how to interpret Nmap reports.
  • Finally, we talk about other useful Nmap options.
Network Security Fundamentals The aim of this video is to introduce some fundamental network security concepts that are needed to get a basic understanding of how Nmap works.
  • The first step is to talk about the OSI layer and how packets are exchanged between remote hosts.
  • Then we delve into analyzing the TCP and IP headers.
  • Finally, we walk though how the TCP SYN scan works.
Service Version Detection The aim of this video is to learn how to use Nmap’s Service Version Detection, why it is important and how it works behind the scenes.
  • The first step is to learn by example service scanning of a remote host.
  • Then, we discuss why version detection is important.
  • Finally, we analyze how Nmap’s version detection works behind the scenes.
Operating System Detection The aim of the video is to get acquainted with Nmap’s remote Operating System detection capability.
  • The first step is to learn by example how to conduct a remote OS detection.
  • Then we talk about scenarios where remote OS detection is important.
  • Finally, we summarize how remote OS detection works.
The Course Overview This video provides an overview of the entire course. The Course Overview This video provides an overview of the entire course. The Course Overview This video provides an overview of the entire course. The Course Overview This video provides an overview of the entire course. This video provides an overview of the entire course. This video provides an overview of the entire course. Nmap Primer The aim of the video is to let the viewer get acquainted with Nmap and show them its basic functionality and capabilities.
  • The first step is to walk through a simple example of an Nmap session.
  • Then we learn how to interpret Nmap reports.
  • Finally, we talk about other useful Nmap options.
Nmap Primer The aim of the video is to let the viewer get acquainted with Nmap and show them its basic functionality and capabilities.
  • The first step is to walk through a simple example of an Nmap session.
  • Then we learn how to interpret Nmap reports.
  • Finally, we talk about other useful Nmap options.
Nmap Primer The aim of the video is to let the viewer get acquainted with Nmap and show them its basic functionality and capabilities.
  • The first step is to walk through a simple example of an Nmap session.
  • Then we learn how to interpret Nmap reports.
  • Finally, we talk about other useful Nmap options.
Nmap Primer The aim of the video is to let the viewer get acquainted with Nmap and show them its basic functionality and capabilities.
  • The first step is to walk through a simple example of an Nmap session.
  • Then we learn how to interpret Nmap reports.
  • Finally, we talk about other useful Nmap options.
The aim of the video is to let the viewer get acquainted with Nmap and show them its basic functionality and capabilities.
  • The first step is to walk through a simple example of an Nmap session.
  • Then we learn how to interpret Nmap reports.
  • Finally, we talk about other useful Nmap options.
The aim of the video is to let the viewer get acquainted with Nmap and show them its basic functionality and capabilities.
  • The first step is to walk through a simple example of an Nmap session.
  • Then we learn how to interpret Nmap reports.
  • Finally, we talk about other useful Nmap options.
Network Security Fundamentals The aim of this video is to introduce some fundamental network security concepts that are needed to get a basic understanding of how Nmap works.
  • The first step is to talk about the OSI layer and how packets are exchanged between remote hosts.
  • Then we delve into analyzing the TCP and IP headers.
  • Finally, we walk though how the TCP SYN scan works.
Network Security Fundamentals The aim of this video is to introduce some fundamental network security concepts that are needed to get a basic understanding of how Nmap works.
  • The first step is to talk about the OSI layer and how packets are exchanged between remote hosts.
  • Then we delve into analyzing the TCP and IP headers.
  • Finally, we walk though how the TCP SYN scan works.
Network Security Fundamentals The aim of this video is to introduce some fundamental network security concepts that are needed to get a basic understanding of how Nmap works.
  • The first step is to talk about the OSI layer and how packets are exchanged between remote hosts.
  • Then we delve into analyzing the TCP and IP headers.
  • Finally, we walk though how the TCP SYN scan works.
Network Security Fundamentals The aim of this video is to introduce some fundamental network security concepts that are needed to get a basic understanding of how Nmap works.
  • The first step is to talk about the OSI layer and how packets are exchanged between remote hosts.
  • Then we delve into analyzing the TCP and IP headers.
  • Finally, we walk though how the TCP SYN scan works.
The aim of this video is to introduce some fundamental network security concepts that are needed to get a basic understanding of how Nmap works.
  • The first step is to talk about the OSI layer and how packets are exchanged between remote hosts.
  • Then we delve into analyzing the TCP and IP headers.
  • Finally, we walk though how the TCP SYN scan works.
The aim of this video is to introduce some fundamental network security concepts that are needed to get a basic understanding of how Nmap works.
  • The first step is to talk about the OSI layer and how packets are exchanged between remote hosts.
  • Then we delve into analyzing the TCP and IP headers.
  • Finally, we walk though how the TCP SYN scan works.
Service Version Detection The aim of this video is to learn how to use Nmap’s Service Version Detection, why it is important and how it works behind the scenes.
  • The first step is to learn by example service scanning of a remote host.
  • Then, we discuss why version detection is important.
  • Finally, we analyze how Nmap’s version detection works behind the scenes.
Service Version Detection The aim of this video is to learn how to use Nmap’s Service Version Detection, why it is important and how it works behind the scenes.
  • The first step is to learn by example service scanning of a remote host.
  • Then, we discuss why version detection is important.
  • Finally, we analyze how Nmap’s version detection works behind the scenes.
Service Version Detection The aim of this video is to learn how to use Nmap’s Service Version Detection, why it is important and how it works behind the scenes.
  • The first step is to learn by example service scanning of a remote host.
  • Then, we discuss why version detection is important.
  • Finally, we analyze how Nmap’s version detection works behind the scenes.
Service Version Detection The aim of this video is to learn how to use Nmap’s Service Version Detection, why it is important and how it works behind the scenes.
  • The first step is to learn by example service scanning of a remote host.
  • Then, we discuss why version detection is important.
  • Finally, we analyze how Nmap’s version detection works behind the scenes.
The aim of this video is to learn how to use Nmap’s Service Version Detection, why it is important and how it works behind the scenes.
  • The first step is to learn by example service scanning of a remote host.
  • Then, we discuss why version detection is important.
  • Finally, we analyze how Nmap’s version detection works behind the scenes.
The aim of this video is to learn how to use Nmap’s Service Version Detection, why it is important and how it works behind the scenes.
  • The first step is to learn by example service scanning of a remote host.
  • Then, we discuss why version detection is important.
  • Finally, we analyze how Nmap’s version detection works behind the scenes.
Operating System Detection The aim of the video is to get acquainted with Nmap’s remote Operating System detection capability.
  • The first step is to learn by example how to conduct a remote OS detection.
  • Then we talk about scenarios where remote OS detection is important.
  • Finally, we summarize how remote OS detection works.
Operating System Detection The aim of the video is to get acquainted with Nmap’s remote Operating System detection capability.
  • The first step is to learn by example how to conduct a remote OS detection.
  • Then we talk about scenarios where remote OS detection is important.
  • Finally, we summarize how remote OS detection works.
Operating System Detection The aim of the video is to get acquainted with Nmap’s remote Operating System detection capability.
  • The first step is to learn by example how to conduct a remote OS detection.
  • Then we talk about scenarios where remote OS detection is important.
  • Finally, we summarize how remote OS detection works.
Operating System Detection The aim of the video is to get acquainted with Nmap’s remote Operating System detection capability.
  • The first step is to learn by example how to conduct a remote OS detection.
  • Then we talk about scenarios where remote OS detection is important.
  • Finally, we summarize how remote OS detection works.
The aim of the video is to get acquainted with Nmap’s remote Operating System detection capability.
  • The first step is to learn by example how to conduct a remote OS detection.
  • Then we talk about scenarios where remote OS detection is important.
  • Finally, we summarize how remote OS detection works.
The aim of the video is to get acquainted with Nmap’s remote Operating System detection capability.
  • The first step is to learn by example how to conduct a remote OS detection.
  • Then we talk about scenarios where remote OS detection is important.
  • Finally, we summarize how remote OS detection works.
Scanning Larger Networks 4 lectures 24:41 Host Discovery The aim of this video is to learn how to conduct host discovery with Nmap. We are also going to learn how it works and the differences between local and remote network host discovery.
  • The first step is to showcase an example of host discovery on the local network.
  • Then, we are going to talk about how Nmap host discovery works for both local and remote cases.
  • Finally, we are showcasing an example of remote host discovery.
Adjusting Timing Parameters The aim of this video is to learn how to fine-tune Nmap’s timing and performance parameters.
  • The first step is to showcase some examples of Nmap scans with a variety of timing options.
  • Then we are going to talk about and use Nmap’s timing templates.
  • Finally, we are showcasing more timing options while pointing out the need for balance between speed and accuracy.
Optimizing Nmap Performance The aim of this video is to learn how to optimize Nmap’s performance to reduce scan time by fine-tuning its options.
  • The first step is to see how we can turn Nmap into a superfast scanner.
  • Then, we are going to talk about UDP port scanning, which always takes the most time.
  • Finally, we are going to talk about ways to defeat rate-limiting.
Large Scale Scans The aim of this video is to learn how to refine Nmap scans for larger networks.
  • First, we showcase an Nmap scan of a large number of hosts.
  • Then, we talk about how the various Nmap timing options can improve our large-scale scanning times.
  • Finally, we learn how to manage the Nmap reports from large scans.
Scanning Larger Networks. 4 lectures 24:41 Host Discovery The aim of this video is to learn how to conduct host discovery with Nmap. We are also going to learn how it works and the differences between local and remote network host discovery.
  • The first step is to showcase an example of host discovery on the local network.
  • Then, we are going to talk about how Nmap host discovery works for both local and remote cases.
  • Finally, we are showcasing an example of remote host discovery.
Adjusting Timing Parameters The aim of this video is to learn how to fine-tune Nmap’s timing and performance parameters.
  • The first step is to showcase some examples of Nmap scans with a variety of timing options.
  • Then we are going to talk about and use Nmap’s timing templates.
  • Finally, we are showcasing more timing options while pointing out the need for balance between speed and accuracy.
Optimizing Nmap Performance The aim of this video is to learn how to optimize Nmap’s performance to reduce scan time by fine-tuning its options.
  • The first step is to see how we can turn Nmap into a superfast scanner.
  • Then, we are going to talk about UDP port scanning, which always takes the most time.
  • Finally, we are going to talk about ways to defeat rate-limiting o is to learn how to find interesting points of entry for web...

Additional information

Basic knowledge of Nmap

Mastering Nmap

£ 10 VAT inc.