Penetration Testing Basics With NMAP – L1

Welcome to the Nmap Course!

Nmap is the Internet’s most popular network scanner with advanced features that most people don’t know even exist!

Discover the secrets of network discovery, using Nmap on this course.

Nmap is an indispensable tool that all techies should know well. It is used by all good ethical hackers, penetration testers, systems administrators, and anyone in fact who wants to discover more about the security of a network and its hosts.

You cannot be a good ethical hacker or systems administrator without being an expert in Nmap.

You will go from beginner to expert in easy-to-follow structured steps

The ideal student for this course is technically minded with an interest in ethical hacking and network security.

At the end of this course, you’ll have a practical skill-set in using Nmap to scan networks. and will get bit insight about network pentesting

This Course is for you if you’re:

  • Anyone interested in network security.
  • Techies, ethical hackers, penetration testers and systems administrators.
  • Those wanting to become ethical hackers, penetration testers and systems administrators.

About Nmap

Nmap is used to discover hosts and services on a computer network by sending packets and analyzing the responses.

Nmap provides a number of features for probing computer networks, including host discovery and service and operating system detection. These features are extensible by scripts that provide more advanced service detection, vulnerability detection, and other features. Nmap can adapt to network conditions including latency and congestion during a scan.

Nmap started as a Linux utility and was ported to other systems including Windows, macOS, and BSD. It is most popular on Linux, followed by Windows.

happy hacking

What you’ll learn

  • How does nmap work
  • Basics of Network pentesting
  • Detailed insight about nmap command line
  • How to use nmap along with multiple parameters

Are there any course requirements or prerequisites?

  • Basics of linux and it’s Command line

Who this course is for:

  • Beginners or intermediate those who would like to get into network pentesting and auditing

Introduction

1
Course Introduction
3:30
2
Introduction to Nmap
3:00
3
Why use Nmap
4:00
4
Pre Certification Questionnaire

Commands and Scanning

1
Basic Scans
10:30
2
Stealth Scans
3:00
3
Version Scanning
5:00
4
OS Scanning
2:30
5
Aggressive Scanning
2:00
6
Scanning Multiple Hosts
3:00
7
Port Scanning
2:30
8
Scanning from IP List (Files)
2:00

Verbosit and Exporting Scan Results

1
Verbosity and Exporting Scan Results
2:00
2
Nmap Normal Output
4:00
3
Multiple Output Formats
1:30

Nmap Extras

1
Nmap Help
1:30
2
Nmap Scripting Engines
4:00
3
Nmap Graphical User Interface (Zenmap)
2:00

Conclusion

1
Conclusion
1:00

What to do Next

1
What to do next ?
1:00

Be the first to add a review.

Please, login to leave a review
Add to Wishlist
Get course
Enrolled: 2000 students
Duration: 24 Hours
Lectures: 19
Level: Beginner

Archive

Working hours

Monday 9:30 am - 6.00 pm
Tuesday 9:30 am - 6.00 pm
Wednesday 9:30 am - 6.00 pm
Thursday 9:30 am - 6.00 pm
Friday 9:30 am - 5.00 pm
Saturday Closed
Sunday Closed
This website uses cookies and asks your personal data to enhance your browsing experience.