Testing network security controls and discovering vulnerabilities are important parts of any organization's security plan. This course will help you learn how to use Nmap to discover network hosts and potential vulnerabilities.
Nmap, or network mapper, is a tool that has been around for more than 20 years. In this course, Getting Started with Nmap 7, you will learn how this versatile tool can be broken down into phases that are easily understood and implemented. First, you will go over Nmap installation and command structure. Next, you will move progressively through each scan phase until you are leveraging more advanced features. Finally, you will have the opportunity to apply what you learn to a scenario where you use Nmap to evaluate network devices. By the end of the course, you will have a basic understanding of how to use Nmap for internal security testing and will be running your own commands to detect applications running on your devices.
Nmap, or network mapper, is a tool that has been around for more than 20 years. In this course, Getting Started with Nmap 7, you will learn how this versatile tool can be broken down into phases that are easily understood and implemented. First, you will go over Nmap installation and command structure. Next, you will move progressively through each scan phase until you are leveraging more advanced features. Finally, you will have the opportunity to apply what you learn to a scenario where you use Nmap to evaluate network devices. By the end of the course, you will have a basic understanding of how to use Nmap for internal security testing and will be running your own commands to detect applications running on your devices.