Mastering Practical Network Scanning

Course

Online

£ 150 VAT inc.

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

Hands-on experience in performing network scanning using NmapNetwork scanning is the process of assessing a network to identify an active host network, which will either be an attacker or a medium for security assessment. This procedure plays an extremely vital role in risk assessment programs or when preparing a security plan for your organization.This course picks up where Learning Practical Network Scanning finished and focuses on the most widely available customization network scanning tool: Nmap. Sills learned with Nmap can be later applied to many other applications.First, it starts by understanding various methods to define scanning targets. Next, the course covers understanding (and adjusting) how ports are scanned and applications and operating systems are detected. Later, it explains how to detect and bypass firewalls and perform scripting to make common tasks easy to repeat.About the AuthorAndrew Crouthamel is an experienced Senior Network Engineer and IT trainer who resides in Doylestown, PA, and currently works with organizations such as NASA, ESA, JAXA, Boeing, and the US Air Force. His passion for teaching shows in his courses, which are filled with excitement and real-world anecdotes.
For more information about him, please refer to the following links:

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

Learn how various Nmap detection algorithms function
Optimize Nmap to reduce your scan times and be as efficient as possible
Bypass firewalls and trick IDS to ensure your network scans work correctly
Learn how to create scripts to automate Nmap tasks

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Emagister S.L. (data controller) will process your data to carry out promotional activities (via email and/or phone), publish reviews, or manage incidents. You can learn about your rights and manage your preferences in the privacy policy.

Reviews

This centre's achievements

2021

All courses are up to date

The average rating is higher than 3.7

More than 50 reviews in the last 12 months

This centre has featured on Emagister for 6 years

Subjects

  • Network Training
  • TCP
  • IP
  • Import
  • Systems
  • Operating Systems
  • DNS
  • Network
  • Networks
  • Options

Course programme

Host Discovery 5 lectures 29:14 The Course Overview This video provides an overview of the entire course. Specifying Targets How do you tell Nmap to scan targets? How about large lists?
  • Provide targets at the end of the command
  • Specify CIDR networks, individual hosts, or ranges
  • Import text file lists that were created with a prior scan or other software
Finding IP Addresses How do you find the IP addresses and subnets you need to scan?
  • External resources can be identified with WHOIS lookups
  • Specific external records can be found with DNS lookups
  • Lastly, BGP AS records can be used to determine subnets owned by a company
Tweaking Discovery What methods can be used to determine whether targets are up and responding?
  • Use a list scan to passively detect targets
  • Run a standard ping scan to determine which are up
  • Disable ping when you have a known target list
Discovery Methods How does Nmap discover a target? What protocols and options are used?
  • First, TCP with SYN and ACK are used
  • Second, UDP and ICMP ping are used
  • Lastly, ARP can be used to scan a local network
Host Discovery 5 lectures 29:14 The Course Overview This video provides an overview of the entire course. Specifying Targets How do you tell Nmap to scan targets? How about large lists?
  • Provide targets at the end of the command
  • Specify CIDR networks, individual hosts, or ranges
  • Import text file lists that were created with a prior scan or other software
Finding IP Addresses How do you find the IP addresses and subnets you need to scan?
  • External resources can be identified with WHOIS lookups
  • Specific external records can be found with DNS lookups
  • Lastly, BGP AS records can be used to determine subnets owned by a company
Tweaking Discovery What methods can be used to determine whether targets are up and responding?
  • Use a list scan to passively detect targets
  • Run a standard ping scan to determine which are up
  • Disable ping when you have a known target list
Discovery Methods How does Nmap discover a target? What protocols and options are used?
  • First, TCP with SYN and ACK are used
  • Second, UDP and ICMP ping are used
  • Lastly, ARP can be used to scan a local network
The Course Overview This video provides an overview of the entire course. The Course Overview This video provides an overview of the entire course. The Course Overview This video provides an overview of the entire course. The Course Overview This video provides an overview of the entire course. This video provides an overview of the entire course. This video provides an overview of the entire course. Specifying Targets How do you tell Nmap to scan targets? How about large lists?
  • Provide targets at the end of the command
  • Specify CIDR networks, individual hosts, or ranges
  • Import text file lists that were created with a prior scan or other software
Specifying Targets How do you tell Nmap to scan targets? How about large lists?
  • Provide targets at the end of the command
  • Specify CIDR networks, individual hosts, or ranges
  • Import text file lists that were created with a prior scan or other software
Specifying Targets How do you tell Nmap to scan targets? How about large lists?
  • Provide targets at the end of the command
  • Specify CIDR networks, individual hosts, or ranges
  • Import text file lists that were created with a prior scan or other software
Specifying Targets How do you tell Nmap to scan targets? How about large lists?
  • Provide targets at the end of the command
  • Specify CIDR networks, individual hosts, or ranges
  • Import text file lists that were created with a prior scan or other software
How do you tell Nmap to scan targets? How about large lists?
  • Provide targets at the end of the command
  • Specify CIDR networks, individual hosts, or ranges
  • Import text file lists that were created with a prior scan or other software
How do you tell Nmap to scan targets? How about large lists?
  • Provide targets at the end of the command
  • Specify CIDR networks, individual hosts, or ranges
  • Import text file lists that were created with a prior scan or other software
Finding IP Addresses How do you find the IP addresses and subnets you need to scan?
  • External resources can be identified with WHOIS lookups
  • Specific external records can be found with DNS lookups
  • Lastly, BGP AS records can be used to determine subnets owned by a company
Finding IP Addresses How do you find the IP addresses and subnets you need to scan?
  • External resources can be identified with WHOIS lookups
  • Specific external records can be found with DNS lookups
  • Lastly, BGP AS records can be used to determine subnets owned by a company
Finding IP Addresses How do you find the IP addresses and subnets you need to scan?
  • External resources can be identified with WHOIS lookups
  • Specific external records can be found with DNS lookups
  • Lastly, BGP AS records can be used to determine subnets owned by a company
Finding IP Addresses How do you find the IP addresses and subnets you need to scan?
  • External resources can be identified with WHOIS lookups
  • Specific external records can be found with DNS lookups
  • Lastly, BGP AS records can be used to determine subnets owned by a company
How do you find the IP addresses and subnets you need to scan?
  • External resources can be identified with WHOIS lookups
  • Specific external records can be found with DNS lookups
  • Lastly, BGP AS records can be used to determine subnets owned by a company
How do you find the IP addresses and subnets you need to scan?
  • External resources can be identified with WHOIS lookups
  • Specific external records can be found with DNS lookups
  • Lastly, BGP AS records can be used to determine subnets owned by a company
Tweaking Discovery What methods can be used to determine whether targets are up and responding?
  • Use a list scan to passively detect targets
  • Run a standard ping scan to determine which are up
  • Disable ping when you have a known target list
Tweaking Discovery What methods can be used to determine whether targets are up and responding?
  • Use a list scan to passively detect targets
  • Run a standard ping scan to determine which are up
  • Disable ping when you have a known target list
Tweaking Discovery What methods can be used to determine whether targets are up and responding?
  • Use a list scan to passively detect targets
  • Run a standard ping scan to determine which are up
  • Disable ping when you have a known target list
Tweaking Discovery What methods can be used to determine whether targets are up and responding?
  • Use a list scan to passively detect targets
  • Run a standard ping scan to determine which are up
  • Disable ping when you have a known target list
What methods can be used to determine whether targets are up and responding?
  • Use a list scan to passively detect targets
  • Run a standard ping scan to determine which are up
  • Disable ping when you have a known target list
What methods can be used to determine whether targets are up and responding?
  • Use a list scan to passively detect targets
  • Run a standard ping scan to determine which are up
  • Disable ping when you have a known target list
Discovery Methods How does Nmap discover a target? What protocols and options are used?
  • First, TCP with SYN and ACK are used
  • Second, UDP and ICMP ping are used
  • Lastly, ARP can be used to scan a local network
Discovery Methods How does Nmap discover a target? What protocols and options are used?
  • First, TCP with SYN and ACK are used
  • Second, UDP and ICMP ping are used
  • Lastly, ARP can be used to scan a local network
Discovery Methods How does Nmap discover a target? What protocols and options are used?
  • First, TCP with SYN and ACK are used
  • Second, UDP and ICMP ping are used
  • Lastly, ARP can be used to scan a local network
Discovery Methods How does Nmap discover a target? What protocols and options are used?
  • First, TCP with SYN and ACK are used
  • Second, UDP and ICMP ping are used
  • Lastly, ARP can be used to scan a local network
How does Nmap discover a target? What protocols and options are used?
  • First, TCP with SYN and ACK are used
  • Second, UDP and ICMP ping are used
  • Lastly, ARP can be used to scan a local network
How does Nmap discover a target? What protocols and options are used?
  • First, TCP with SYN and ACK are used
  • Second, UDP and ICMP ping are used
  • Lastly, ARP can be used to scan a local network
Port Scanning 3 lectures 17:10 TCP Handshake Scan Options How does Nmap detect which ports are open? What options do you have available?
  • First, TCP SYN and ACK scans can be run on ports
  • Full TCP connection scans canbe run
  • Lastly, TCP FIN scans can be used
More TCP Scan Options What additional, less used scan options are available?
  • First, one can use a TCP PSH scan
  • A complex idle scan can be run from a zombie machine
  • The TCP window can be analyzed
UDP and IP Scan Options How does Nmap scan UDP ports and IP?
  • UDP scans are used, relying on ICMP unreachable errors
  • UDP scans can be restricted to groups for parallelism
  • IP scans can be run to determine protocol support
Port Scanning rbocharging it?
  • Change the timing attribute to optimize timing!
  • There are six timing templates to use
  • The fastest ones, T4 and T5, are an order of magnitude faster than the default.
Changing Timing How can you physically speed up Nmap, turbocharging it?
  • Change the timing attribute to optimize timing!
  • There are six timing templates to use
  • The fastest ones, T4 and T5, are an order of magnitude faster than the default.
Changing Timing How can you physically speed up Nmap, turbocharging it?
  • Change the timing attribute to optimize timing!
  • There are six timing templates to use
  • The fastest ones, T4 and T5, are an order of magnitude faster than the default.
How can you physically speed up Nmap, turbocharging it?
  • Change the timing attribute to optimize timing!
  • There are six timing templates to use
  • The fastest ones, T4 and T5, are an order of magnitude faster than the default.
How can you physically speed up Nmap, turbocharging it?
  • Change the timing attribute to optimize timing!
  • There are six timing templates to use
  • The fastest ones, T4 and T5, are an order of magnitude faster than the default.
Applications and Operating Systems 2 lectures 11:21 Application Detection How can applications and services running on ports be detected by Nmap?
  • First, Nmap sends TCP SYN and listens for service banners
  • Next, it scans UDP ports and runs RPC grinders
  • Lastly, it checks SSL ports and it attempts connections and scans on those
Remote OS Detection How can operating systems running on targets be detected by Nmap?
  • Nmap has a large database of OS fingerprints
  • These are detected by checking open and closed TCP ports
  • Probes are sent, with responses recorded and compared
Applications and Operating Systems 2 lectures 11:21 Application Detection How can applications and services running on ports be detected by Nmap?
  • First, Nmap sends TCP SYN and listens for service banners
  • Next, it scans UDP ports and runs RPC grinders
  • Lastly, it checks SSL ports and it attempts connections and scans on those
Remote OS Detection How can operating systems running on targets be detected by Nmap?
  • Nmap has a large database of OS fingerprints
  • These are detected by checking open and closed TCP ports
  • Probes are sent, with responses recorded and compared
Application Detection How can applications and services running on ports be detected by Nmap?
  • First, Nmap sends TCP SYN and listens for service banners
  • Next, it scans UDP ports and runs RPC grinders
  • Lastly, it checks SSL ports and it attempts connections and scans on those
Application Detection How can applications and services running on ports be detected by Nmap?
  • First, Nmap sends TCP SYN and listens for service banners
  • Next, it scans UDP ports and runs RPC grinders
  • Lastly, it checks SSL ports and it attempts connections and scans on those
Application Detection How can applications and services running on ports be detected by Nmap?
  • First, Nmap sends TCP SYN and listens for service banners
  • Next, it scans UDP ports and runs RPC grinders
  • Lastly, it checks SSL ports and it attempts connections and scans on those
Application Detection How can applications and services running on ports be detected by Nmap?
  • First, Nmap sends TCP SYN and listens for service banners
  • Next, it scans UDP ports and runs RPC grinders
  • Lastly, it checks SSL ports and it attempts connections and scans on those
How can applications and services running on ports be detected by Nmap?
  • First, Nmap sends TCP SYN and listens for service banners
  • Next, it scans UDP ports and runs RPC grinders
  • Lastly, it checks SSL ports and it attempts connections and scans on those
How can applications and services running on ports be detected by Nmap?
  • First, Nmap...

Additional information

A basic understanding of network scanning, cybersecurity, and networking is required

Mastering Practical Network Scanning

£ 150 VAT inc.