Mastering Nmap
Course
Online
Description
-
Type
Course
-
Methodology
Online
-
Start date
Different dates available
A step-by-step tutorial to gain expertise in NmapYou will learn how to use this tool to implement a wide variety of practical tasks related to pentesting and network monitoring. The tutorial will start with installation techniques and then explain Nmap fundamentals. Moving on, we will cover the advanced functionalities of Nmap Scripting Engine (NSE) such as libraries, scripts, APIs, and so on. You will be able to perform custom tasks, the fundamentals of Lua programming, scanning mail servers, scanning databases, windows machines, SCADA systems, and large networks.About The AuthorFotis Chantzis is currently an information security engineer at Mayo Clinic. He has also been a part of the main Nmap development team since 2009, when he wrote Ncrack. He also worked with the author of Nmap when he successfully completed the Google summer code 2010. He also represented Nmap at the Google Mentor Summit in October 2016. He is passionate about computer security and has even has his own startup Primavista.
Facilities
Location
Start date
Start date
About this course
Learn network security concepts that are required to properly comprehend and grasp how all Nmap utilities work the way they do
Handle large numbers of results from scanning large networks
IT administrators can effectively monitor their network for critical changes that might lead to potential vulnerabilities, by comparing the results from everyday scans
Master the Nmap Scripting Engine (NSE) by writing new (and customizing existing) Lua scripts that further extend Nmap's capabilities
Utilize the Nmap suite's accompanying tools to refine and effectively automate your everyday network tasks, including debugging, visualizing, monitoring, and network auditing
Conduct host discovery, port scanning, and version and OS detection for every system in your network
Reviews
This centre's achievements
All courses are up to date
The average rating is higher than 3.7
More than 50 reviews in the last 12 months
This centre has featured on Emagister for 4 years
Subjects
- Options
- Networks
- TCP-IP
- Works
- Network
- Network security
- IP
- TCP
- Network Training
- Operating System
Course programme
- The first step is to walk through a simple example of an Nmap session.
- Then we learn how to interpret Nmap reports.
- Finally, we talk about other useful Nmap options.
- The first step is to talk about the OSI layer and how packets are exchanged between remote hosts.
- Then we delve into analyzing the TCP and IP headers.
- Finally, we walk though how the TCP SYN scan works.
- The first step is to learn by example service scanning of a remote host.
- Then, we discuss why version detection is important.
- Finally, we analyze how Nmap’s version detection works behind the scenes.
- The first step is to learn by example how to conduct a remote OS detection.
- Then we talk about scenarios where remote OS detection is important.
- Finally, we summarize how remote OS detection works.
- The first step is to walk through a simple example of an Nmap session.
- Then we learn how to interpret Nmap reports.
- Finally, we talk about other useful Nmap options.
- The first step is to talk about the OSI layer and how packets are exchanged between remote hosts.
- Then we delve into analyzing the TCP and IP headers.
- Finally, we walk though how the TCP SYN scan works.
- The first step is to learn by example service scanning of a remote host.
- Then, we discuss why version detection is important.
- Finally, we analyze how Nmap’s version detection works behind the scenes.
- The first step is to learn by example how to conduct a remote OS detection.
- Then we talk about scenarios where remote OS detection is important.
- Finally, we summarize how remote OS detection works.
- The first step is to walk through a simple example of an Nmap session.
- Then we learn how to interpret Nmap reports.
- Finally, we talk about other useful Nmap options.
- The first step is to walk through a simple example of an Nmap session.
- Then we learn how to interpret Nmap reports.
- Finally, we talk about other useful Nmap options.
- The first step is to walk through a simple example of an Nmap session.
- Then we learn how to interpret Nmap reports.
- Finally, we talk about other useful Nmap options.
- The first step is to walk through a simple example of an Nmap session.
- Then we learn how to interpret Nmap reports.
- Finally, we talk about other useful Nmap options.
- The first step is to walk through a simple example of an Nmap session.
- Then we learn how to interpret Nmap reports.
- Finally, we talk about other useful Nmap options.
- The first step is to walk through a simple example of an Nmap session.
- Then we learn how to interpret Nmap reports.
- Finally, we talk about other useful Nmap options.
- The first step is to talk about the OSI layer and how packets are exchanged between remote hosts.
- Then we delve into analyzing the TCP and IP headers.
- Finally, we walk though how the TCP SYN scan works.
- The first step is to talk about the OSI layer and how packets are exchanged between remote hosts.
- Then we delve into analyzing the TCP and IP headers.
- Finally, we walk though how the TCP SYN scan works.
- The first step is to talk about the OSI layer and how packets are exchanged between remote hosts.
- Then we delve into analyzing the TCP and IP headers.
- Finally, we walk though how the TCP SYN scan works.
- The first step is to talk about the OSI layer and how packets are exchanged between remote hosts.
- Then we delve into analyzing the TCP and IP headers.
- Finally, we walk though how the TCP SYN scan works.
- The first step is to talk about the OSI layer and how packets are exchanged between remote hosts.
- Then we delve into analyzing the TCP and IP headers.
- Finally, we walk though how the TCP SYN scan works.
- The first step is to talk about the OSI layer and how packets are exchanged between remote hosts.
- Then we delve into analyzing the TCP and IP headers.
- Finally, we walk though how the TCP SYN scan works.
- The first step is to learn by example service scanning of a remote host.
- Then, we discuss why version detection is important.
- Finally, we analyze how Nmap’s version detection works behind the scenes.
- The first step is to learn by example service scanning of a remote host.
- Then, we discuss why version detection is important.
- Finally, we analyze how Nmap’s version detection works behind the scenes.
- The first step is to learn by example service scanning of a remote host.
- Then, we discuss why version detection is important.
- Finally, we analyze how Nmap’s version detection works behind the scenes.
- The first step is to learn by example service scanning of a remote host.
- Then, we discuss why version detection is important.
- Finally, we analyze how Nmap’s version detection works behind the scenes.
- The first step is to learn by example service scanning of a remote host.
- Then, we discuss why version detection is important.
- Finally, we analyze how Nmap’s version detection works behind the scenes.
- The first step is to learn by example service scanning of a remote host.
- Then, we discuss why version detection is important.
- Finally, we analyze how Nmap’s version detection works behind the scenes.
- The first step is to learn by example how to conduct a remote OS detection.
- Then we talk about scenarios where remote OS detection is important.
- Finally, we summarize how remote OS detection works.
- The first step is to learn by example how to conduct a remote OS detection.
- Then we talk about scenarios where remote OS detection is important.
- Finally, we summarize how remote OS detection works.
- The first step is to learn by example how to conduct a remote OS detection.
- Then we talk about scenarios where remote OS detection is important.
- Finally, we summarize how remote OS detection works.
- The first step is to learn by example how to conduct a remote OS detection.
- Then we talk about scenarios where remote OS detection is important.
- Finally, we summarize how remote OS detection works.
- The first step is to learn by example how to conduct a remote OS detection.
- Then we talk about scenarios where remote OS detection is important.
- Finally, we summarize how remote OS detection works.
- The first step is to learn by example how to conduct a remote OS detection.
- Then we talk about scenarios where remote OS detection is important.
- Finally, we summarize how remote OS detection works.
- The first step is to showcase an example of host discovery on the local network.
- Then, we are going to talk about how Nmap host discovery works for both local and remote cases.
- Finally, we are showcasing an example of remote host discovery.
- The first step is to showcase some examples of Nmap scans with a variety of timing options.
- Then we are going to talk about and use Nmap’s timing templates.
- Finally, we are showcasing more timing options while pointing out the need for balance between speed and accuracy.
- The first step is to see how we can turn Nmap into a superfast scanner.
- Then, we are going to talk about UDP port scanning, which always takes the most time.
- Finally, we are going to talk about ways to defeat rate-limiting.
- First, we showcase an Nmap scan of a large number of hosts.
- Then, we talk about how the various Nmap timing options can improve our large-scale scanning times.
- Finally, we learn how to manage the Nmap reports from large scans.
- The first step is to showcase an example of host discovery on the local network.
- Then, we are going to talk about how Nmap host discovery works for both local and remote cases.
- Finally, we are showcasing an example of remote host discovery.
- The first step is to showcase some examples of Nmap scans with a variety of timing options.
- Then we are going to talk about and use Nmap’s timing templates.
- Finally, we are showcasing more timing options while pointing out the need for balance between speed and accuracy.
- The first step is to see how we can turn Nmap into a superfast scanner.
- Then, we are going to talk about UDP port scanning, which always takes the most time.
- Finally, we are going to talk about ways to defeat rate-limiting o is to learn how to find interesting points of entry for web...
Additional information
Mastering Nmap