We may earn an affiliate commission when you visit our partners.
Course image
Nathan House

Welcome to the Complete Nmap Course. Nmap is the Internets most popular network scanner with advanced features that most people don't know even exists. Discover the secrets of ethical hacking and network discovery, using Nmap on this complete course.Nmap is an indispensable tool that all techies should know well. It is used by all good ethical hackers, penetration testers, systems administrators, and anyone in fact who wants to discovery more about the security of a network and its hosts. You cannot be a good ethical hacker or systems administrator without being an expert in Nmap. You will go from beginner to expert in easy to follow structured steps - and we cover all major platforms that Nmap can be used on, including - Windows, Mac, Linux and Kali.

Read more

Welcome to the Complete Nmap Course. Nmap is the Internets most popular network scanner with advanced features that most people don't know even exists. Discover the secrets of ethical hacking and network discovery, using Nmap on this complete course.Nmap is an indispensable tool that all techies should know well. It is used by all good ethical hackers, penetration testers, systems administrators, and anyone in fact who wants to discovery more about the security of a network and its hosts. You cannot be a good ethical hacker or systems administrator without being an expert in Nmap. You will go from beginner to expert in easy to follow structured steps - and we cover all major platforms that Nmap can be used on, including - Windows, Mac, Linux and Kali.

The ideal student for this course is technically minded with an interest in ethical hacking and network security.

At the end of this course you'll have a practical skill-set in using Nmap to scan networks. You will be able to find vulnerabilities and weaknesses on systems that can be exploited by hackers.

Enroll now

What's inside

Learning objectives

  • You will become an expert in using nmap for ethical hacking, system administration and network security.
  • Learn how to successfully discover active and vulnerable hosts on a network.
  • Discover the secrets of ethical hacking and network discovery, using nmap on this complete course.
  • You will explore the nmap scripting engine (nse) used for more advanced discovery and hacking. we look at many scripts including those used for brute forcing passwords in email and databases, cross-site scripting (xss) and sql injection (sqli) discovery and other cool nmap scripts.
  • Learn firewall and intrusion detection evasion, nmap output (convert, merge and compare) results, zenmap (nmap gui) and how criminal black hat hackers use nmap.
  • Scan to determine firewall rules while avoiding intrusion detection systems (ids).
  • You will understand how nmap is used in combination with criminal hacking infrastructures (command and control) servers.
  • Importantly we cover the both the command line version of nmap and the gui version of nmap called zenmap.
  • Plus i include some great extra bonuses, like useful bash scripts to use with nmap and an amazing cheat sheet to easily remember complex commands.
  • You will explore nmap installation, hacking labs, network and port scanner basics, target selection, port states, host discovery, scan techniques and port selection.
  • You will master service detection, version detection, operating system detection, and optimizing timing and performance.
  • Show more
  • Show less

Syllabus

Introduction
Introduction to instructor (BIO)
Target Audience
What is Nmap
Read more
Goals and Learning Objectives

How to start a career in cyber security and ethical hacking.

Cheat Sheet
Nmap Cheat Sheet
Installing Nmap and Cloud Labs
How to Install Nmap
Cloud Based Hacking Lab
Nmap Basics, Target Specification & Port States
An Introduction to Port Scanning and Fingerprinting
Nmap Basics
Nmap Target Specification
Nmap Port states
Nmap Discovery and Ping Scanning
Nmap Discovery - Part 1
Nmap Discovery - Part 2
Nmap Discovery - Part 3
Nmap Discovery - Part 4
Nmap Scan Techniques
Nmap Scan Techniques - SYN and Connect
Nmap Scan Techniques - UDP and SCTP
Nmap Scan Techniques - TCP ACK and Window
Nmap Scan Techniques - NULL, FIN, Xmas, Maimon Idle Scan and IP Protocol
Nmap Port Specification, Service, Version & OS Detection
Nmap Port Specification
Nmap Service and Version Detection
Nmap OS Detection
Nmap Scripting Engine (NSE)
Nmap Scripting Engine (NSE) Part 1 - Categories
Nmap Scripting Engine (NSE) Part 2 - Usage and Cool Scripts
Nmap Scripting Engine (NSE) Part 3 - Usage and Cool Scripts
Nmap Scripting Engine (NSE) Part 4 - Usage and Cool Scripts
Writing Nmap Scripting Engine (NSE) Scripts
Nmap Performance, Firewall and IDS Evasion
Nmap Timing and Performance
Nmap Firewall / IDS Evasion and Spoofing Part 1
Nmap Firewall / IDS Evasion and Spoofing Part 2
Nmap Output and Extras
Nmap Output
Nmap Output & Miscellaneous Options
Extras
Zenmap
How to Use Zenmap - Nmap GUI
Zenmap Built-in Profiles
How to use the Zenmap Profile Editor
How Criminal Black Hats Use Nmap with Hacking Infrastructures
Command and Control (C&C) Hacking Infrastructure
Wrap up
Certificate of Completion
Congratulations
Preview Lectures
Preview Introduction
Password cracking part 1
Password cracking part 2
Bypassing firewalls and HTTP proxies part 3
Choosing an E-Mail provider
Router Vulnerability Scanning (Shodan, Qualys)
BONUS
BONUS - How to Start a Career in Cyber Security

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Ideal for beginners, introduces core concepts in ethical hacking and network security
Provides comprehensive coverage of Nmap's advanced features, such as the Scripting Engine (NSE) for deeper network discovery
Includes practical exercises and demonstrations to enhance comprehension and hands-on skills
Taught by instructors with extensive experience in ethical hacking and network security
Meets industry standards and provides valuable skills for ethical hackers, system administrators, and network security professionals
Covers both command line and GUI versions of Nmap, making it accessible to learners with varying technical backgrounds

Save this course

Save The Complete Nmap Ethical Hacking Course : Network Security to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in The Complete Nmap Ethical Hacking Course : Network Security with these activities:
Review concepts in network security
Enhance foundational knowledge in network security concepts to prepare for Nmap's advanced features.
Browse courses on Nmap
Show steps
  • Revisit fundamentals of network security and its importance.
  • Review concepts of firewalls, intrusion detection systems, and network vulnerabilities.
Conduct port scanning exercises
Solidify understanding of port scanning techniques and Nmap commands through hands-on practice.
Browse courses on Port Scanning
Show steps
  • Set up a virtual environment for port scanning exercises.
  • Use Nmap to scan a range of ports on multiple hosts.
  • Analyze scan results and identify open ports and services.
Participate in Nmap user forums
Engage with a community of Nmap users for knowledge exchange and problem-solving.
Show steps
  • Find active Nmap user forums or discussion boards.
  • Participate in discussions, ask questions, and share knowledge.
Three other activities
Expand to see all activities and additional details
Show all six activities
Explore Nmap Scripting Engine (NSE) tutorials
Expand knowledge of Nmap by delving into NSE scripts for advanced network discovery and hacking.
Show steps
  • Locate and review Nmap Scripting Engine (NSE) documentation.
  • Follow tutorials on specific NSE scripts for tasks such as password cracking and vulnerability scanning.
Develop a network security assessment plan using Nmap
Apply Nmap skills to create a comprehensive plan for identifying vulnerabilities in a network.
Show steps
  • Define the scope and objectives of the assessment.
  • Plan the Nmap scan strategy based on network topology and target systems.
  • Interpret Nmap scan results and identify potential vulnerabilities.
Launch a personal security research project
Deepen understanding of Nmap and network security by conducting an independent research project.
Show steps
  • Identify a specific security-related topic for exploration.
  • Use Nmap and other tools to gather data and analyze vulnerabilities.
  • Document research findings and share insights with the community.

Career center

Learners who complete The Complete Nmap Ethical Hacking Course : Network Security will develop knowledge and skills that may be useful to these careers:
Penetration Tester
A Penetration Tester evaluates the security of computer systems and networks by simulating attacks from malicious actors. This course can provide you with the skills and knowledge needed to succeed as a Penetration Tester. Through practical exercises with Nmap, you will learn how to identify and exploit vulnerabilities in networks, enabling you to assess the effectiveness of an organization's security measures and make recommendations for improvement.
Ethical Hacker
An Ethical Hacker uses their knowledge of computer systems and networks to identify vulnerabilities that could be exploited by malicious actors. This course can provide you with the foundation you need to develop a career as an Ethical Hacker. Through hands-on exercises with Nmap, you will gain experience in identifying and exploiting security weaknesses in networks, empowering you to help organizations protect their systems from cyber threats.
Cybersecurity Engineer
A Cybersecurity Engineer designs, implements, and maintains security measures to protect computer systems and networks from cyber threats. This course can help you build a strong foundation for a career as a Cybersecurity Engineer. By gaining proficiency in Nmap, you will develop the ability to assess network vulnerabilities and implement appropriate countermeasures, ensuring the confidentiality, integrity, and availability of sensitive data and systems.
Information Security Analyst
An Information Security Analyst identifies and assesses risks to an organization's information systems and develops strategies to mitigate those risks. This course can provide you with the knowledge and skills needed to succeed as an Information Security Analyst. Through hands-on exercises with Nmap, you will learn how to identify and exploit security vulnerabilities in networks, enabling you to develop effective security measures and protect sensitive data from unauthorized access.
Security Consultant
A Security Consultant provides expert advice and guidance to organizations on how to improve their security posture. This course can enhance your qualifications as a Security Consultant by providing you with in-depth knowledge of Nmap, a powerful tool for network vulnerability assessment. By learning to use Nmap effectively, you will be able to identify potential security risks and develop strategies to mitigate them, making you a valuable asset to any organization seeking to strengthen its cybersecurity.
Network Security Analyst
A Network Security Analyst ensures the protection of an organization's computer networks and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course may be useful in helping you develop the necessary skills to succeed in this role. Specifically, the course's focus on Nmap, an advanced network scanner, can help you understand the methods attackers use to exploit network vulnerabilities. By learning how to detect and prevent these attacks, you will be well-equipped to protect sensitive data and systems.
Security Operations Center (SOC) Analyst
A Security Operations Center (SOC) Analyst monitors and responds to security events within an organization's network. This course can provide you with valuable insights into Nmap, a tool commonly used in SOC environments for network security monitoring and incident response. By understanding how Nmap works, you can enhance your ability to detect and respond to cyber threats, ensuring the protection of your organization's sensitive data and systems.
Incident Responder
An Incident Responder investigates and responds to security incidents within an organization's network. This course can enhance your skills as an Incident Responder by providing you with expertise in Nmap, a tool widely used for network security monitoring and incident response. By learning to use Nmap effectively, you can quickly identify and contain security breaches, minimizing the impact on your organization's operations and reputation.
Risk Analyst
A Risk Analyst identifies and assesses risks to an organization's information systems and develops strategies to mitigate those risks. This course can provide you with valuable insights into Nmap, a tool used for network security monitoring and vulnerability assessment. By understanding how Nmap works, you can enhance your ability to identify and analyze security risks, enabling you to develop effective strategies to protect your organization's sensitive data and systems.
Malware Analyst
A Malware Analyst investigates and analyzes malicious software to understand its behavior and develop countermeasures. This course can provide you with valuable insights into Nmap, a tool used for network security monitoring and incident response. By understanding how Nmap works, you can enhance your ability to detect and analyze malware, enabling you to develop effective strategies to protect your organization's systems from cyber threats.
Systems Administrator
A Systems Administrator manages and maintains computer systems and networks. This course can enhance your skills as a Systems Administrator by providing you with expertise in Nmap, a powerful tool for network troubleshooting and security auditing. By learning to use Nmap effectively, you can quickly identify and resolve network issues, ensuring the smooth operation of your organization's IT infrastructure.
Network Engineer
A Network Engineer designs, implements, and maintains computer networks. This course can complement your knowledge as a Network Engineer by providing you with expertise in Nmap, a tool widely used for network analysis and troubleshooting. By gaining proficiency in Nmap, you can effectively identify and resolve network issues, ensuring the reliability and efficiency of your organization's network infrastructure.
Forensic Investigator
A Forensic Investigator analyzes digital evidence to investigate cybercrimes and other incidents. This course can complement your skills as a Forensic Investigator by providing you with expertise in Nmap, a tool widely used for network reconnaissance and security auditing. By gaining proficiency in Nmap, you can effectively identify and collect digital evidence from networks, ensuring the integrity of your investigations and supporting the prosecution of cybercriminals.
Cloud Security Architect
A Cloud Security Architect designs and implements security measures for cloud computing environments. This course provides valuable knowledge of Nmap, a tool used for network reconnaissance and security auditing in cloud environments. By understanding how Nmap works, you can effectively identify and mitigate security vulnerabilities in cloud deployments, ensuring the protection of sensitive data and systems.
Computer Network Architect
A Computer Network Architect designs and builds computer networks that meet the needs of an organization. This course provides valuable insights into Nmap, a tool used to analyze and troubleshoot network configurations. By understanding how Nmap works, you can develop more secure and efficient networks that are less susceptible to cyberattacks.

Reading list

We've selected 13 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in The Complete Nmap Ethical Hacking Course : Network Security.
The official guide to using Nmap for network discovery and security scanning. A very detailed and up-to-date reference.
A comprehensive guide to ethical hacking, including chapters on Nmap and network security.
Provides a comprehensive guide to hacking, including information on using Nmap for vulnerability scanning and exploitation. It covers topics such as reconnaissance, vulnerability assessment, exploitation, and post-exploitation.
Provides a comprehensive guide to network penetration testing, including information on using Nmap for vulnerability scanning and exploitation. It covers topics such as reconnaissance, vulnerability assessment, exploitation, and post-exploitation.
Provides a comprehensive overview of network security, including information on using Nmap for vulnerability scanning and network mapping. It covers topics such as threat modeling, risk assessment, and security controls.
A comprehensive guide to network security assessment, including chapters on Nmap and other network scanning tools.
Provides a collection of recipes for securing networks, including information on using Nmap for vulnerability scanning and network mapping. It covers topics such as threat modeling, risk assessment, and security controls.
Provides a comprehensive overview of computer security, including information on using Nmap for vulnerability scanning and network mapping. It covers topics such as threat modeling, risk assessment, and security controls.
A comprehensive guide to network security tools and applications, including Nmap.
A comprehensive guide to ethical hacking and penetration testing, including chapters on Nmap and other network scanning tools.
A step-by-step guide to network security, including chapters on Nmap and other network scanning tools.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to The Complete Nmap Ethical Hacking Course : Network Security.
Penetration Testing and Ethical Hacking Complete Hands-on
Most relevant
Hacking in Practice: Intensive Ethical Hacking MEGA Course
Most relevant
Practice Your First Penetration Test: Kali & Metasploit...
Most relevant
Try It: Ethical Hacking
Most relevant
The Complete Ethical Hacking Course for 2016/2017!
Most relevant
Ethical Hacking: Understanding Ethical Hacking
Most relevant
Kali Linux
Most relevant
The Complete Ethical Hacking Course
Most relevant
Metasploit for Beginners: Ethical Penetration Testing
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser