Information Technology
Star icon
Most Popular
Hands on Training icon
Hands On Training
Star icon
Hands on Training icon

Hands-On Network Scanning with Nmap for Network Security

Course Cover
compare button icon

Course Features

icon

Duration

2.59 hours

icon

Delivery Method

Online

icon

Available on

Limited Access

icon

Accessibility

Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Intermediate

icon

Teaching Type

Self Paced

icon

Video Content

2.59 hours

Course Description

Nmap can help you audit and analyze your network security.

About This Video

  • Learn how Nmap can be used to identify vulnerabilities, simulate intruder attacks and protect internal resources
  • This is your preparation guide for performing internal network security audits
  • Zenmap can be used to scan Nmap and to automate tasks using the Nmap scripting engine.

Are you looking to improve your organization's network security and protection? Are you concerned about what might happen if an attacker moves laterally through your network? It is crucial to test your network's security. However, it can be dangerous to not know if an attacker has found a security flaw that could lead to a breach.

This course will teach you how to use Nmap in real-life situations, discover vulnerabilities, and simulate an attack on a system. We will begin by reviewing the various methods of penetration testing, installing Nmap, the types of scans available, and the reasons why different Nmap scanning options are preferred. Next, you'll learn how to customize scans to analyze servers, machines, and networks. For detailed information about the network, you will create Nmap reports. You can also customize formatting options. You will learn how to automate useful activities with the Nmap scripting engine.

This course will prepare you to confidently audit your network using Nmap and scan for vulnerabilities to protect your network.

<>Audience

This course is intended for ethical hackers, penetration testers and system administrators who want to protect their network and hosts.

Requirement:

It is assumed that you have no knowledge of Nmap.

Before attending this course, participants should have a basic knowledge of virtualization technologies, networking concepts, and penetration testing methodologies.

Course Overview

projects-img

International Faculty

projects-img

Post Course Interactions

projects-img

Instructor-Moderated Discussions

Skills You Will Gain

What You Will Learn

Understand the power of Nmap to discover vulnerabilities, emulate intruder attacks, and secure internal resources

Your preparation guide to performing internal network security audits

Utilize Zenmap to perform Nmap scanning and use the Nmap scripting engine to automate tasks

Course Instructors

Brian Rogalski

Instructor

Brian Rogalski is the instructor for this course
Course Cover