In Scanning and Enumeration with NMAP, Ken Underhill gives an overview of scanning and the scanning methodology, which is the process of collecting information on a network using technical tools. Ken Underhill uses an Nmap lab to demonstrate this process. Nmap is a powerful tool used by both attackers and defenders to scan networks.
Overview
Syllabus
- Scanning and Enumeration with NMAP
- Scanning and Enumeration
- NMAP Lab Part 1
- NMAP Lab Part 2
Taught by
Ken Underhill