COURSE

NMAP

Course

The network mapper (NMAP) is one of the highest quality and powerful free network utilities in the cybersecurity professional's arsenal. This NMAP course offers the NMAP skills and commands needed to become a better network administrator, incident responder, or penetration tester. Learn NMAP fundamentals and even create personal hands-on labs.
Full access included with 
Insider Pro
 and 
Teams

6

H

17

M
Time

beginner

i
Designed for learners who have no prior work experience in IT or Cybersecurity, but are interested in starting a career in this exciting field.
Designed for learners with prior cybersecurity work experience who are interested in advancing their career or expanding their skillset.
Designed for learners with a solid grasp of foundational IT and cybersecurity concepts who are interested in pursuing an entry-level security role.
Experience Level

7

i

Earn qualifying credits for certification renewal with completion certificates provided for submission.
CEU's

8557

Enrollees

Learners at 96% of Fortune 1000 companies trust Cybrary

About this course

Nmap Basics is a beginner-level course designed to introduce you to the fundamental concepts of Nmap. Through hands-on labs, you’ll learn the basics of the network mapper (Nmap) and why it’s a critical tool for network discovery, security auditing, and vulnerability assessment. You’ll gain practical experience scanning networks, identifying open ports, and interpreting results—essential skills for any aspiring IT or cybersecurity professional.

Read More

Skills you'll gain

  • Defining "network scanning" and "enumeration"
  • Describing the practical applications of Nmap
  • Using Nmap to scan and enumerate hosts and services on a network
  • Using Nmap to perform basic TCP port scans
  • Analyzing the output of an Nmap scan

Course Outline

1
Module 1: Introduction
0
H
20
Min
1
Module 2: Nmap Basics
2
H
2
Min
1
Module 3: Nmap & The TCP/IP Protocol Suite
0
H
50
Min
1
Module 4: Network Scanning and Discovery
3
H
5
Min
1
Course Assessment
0
H
30
Min

IPv4 for Nmap - NM

Free

8m

Installing Nmap on Windows - NM

Free

7m

Nmap: What It Is and Why It's Important - NM

Free

5m

Target Specification Lab Part 1 - NM

Free

11m

Installing Nmap on Linux - NM

Free

10m

About the Instructor - NM

Free

2m

Nmap and Wireshark Part 1 - NM

Free

10m

Target Specification Lab Part 2 - NM

Free

9m

Course Overview and Prerequisites - NM

Free

2m

Installing Nmap on Mac - NM

Free

10m

Nmap and Wireshark Part 2 - NM

Free

14m

Scan Techniques - NM

Free

11m

Removing Nmap from Windows - NM

Free

8m

Kali Linux: A Hacker's Best Friend - NM

Free

5m

Ethics and Legality of Scanning - NM

Free

10m

Scan Techniques Lab - NM

Free

16m

Nmap & IPv6 - NM

Free

5m

Removing Nmap from Linux - NM

Free

3m

Kali Linux Lab: Running it Live - NM

Free

10m

Host Discovery Part 1 - NM

Free

8m

Removing Nmap from Mac - NM

Free

4m

Host Discovery Part 2 - NM

Free

10m

Getting Help - NM

Free

11m

TCP & UDP Port Scanning - NM

Free

8m

Phases of the Nmap Scan - NM

Free

11m

TCP & UDP Port Scanning Lab Part 1 - NM

Free

9m

Constructing an Nmap Scan - NM

Free

11m

TCP & UDP Port Scanning Lab Part 2

Free

10m

Constructing an Nmap Scan Lab Part 1 - NM

Free

8m

Service and Application Version Detection Part 1 - NM

Free

12m

Constructing an Nmap Scan Lab Part 2 - NM

Free

10m

2.13 General Considerations - NM

Free

11m

Operating System Detection and Fingerprinting Part 1 - NM

Free

10m

Custom Scan Profiles Part 1 - NM

Free

8m

Host Discovery Part 2 - NM

Free

14m

Custom Scan Profiles Part 2 - NM

Free

8m

NSE, Vulnerability Testing & Exploitation Part 1 - NM

Free

6m

NSE, Vulnerability Testing & Exploitation Part 2 - NM

Free

13m

NSE, Vulnerability Testing & Exploitation - NM

Free

10m

Timing and Performance Part 1 - NM

Free

5m

Timing and Performance Part 2 - NM

Free

7m

IPv4 for Nmap - NM

8m

Module 3: Nmap & The TCP/IP Protocol Suite
Target Specification Lab Part 1 - NM

11m

Module 4: Network Scanning and Discovery
About the Instructor - NM

2m

Module 1: Introduction
Nmap and Wireshark Part 1 - NM

10m

Module 3: Nmap & The TCP/IP Protocol Suite
Target Specification Lab Part 2 - NM

9m

Module 4: Network Scanning and Discovery
Installing Nmap on Mac - NM

10m

Module 2: Nmap Basics
Nmap and Wireshark Part 2 - NM

14m

Module 3: Nmap & The TCP/IP Protocol Suite
Scan Techniques - NM

11m

Module 4: Network Scanning and Discovery
Scan Techniques Lab - NM

16m

Module 4: Network Scanning and Discovery
Nmap & IPv6 - NM

5m

Module 3: Nmap & The TCP/IP Protocol Suite
Removing Nmap from Linux - NM

3m

Module 2: Nmap Basics
Host Discovery Part 1 - NM

8m

Module 4: Network Scanning and Discovery
Removing Nmap from Mac - NM

4m

Module 2: Nmap Basics
Host Discovery Part 2 - NM

10m

Module 4: Network Scanning and Discovery
Getting Help - NM

11m

Module 2: Nmap Basics
TCP & UDP Port Scanning - NM

8m

Module 4: Network Scanning and Discovery
Phases of the Nmap Scan - NM

11m

Module 2: Nmap Basics
Course Description

The network mapper (Nmap) is one of the highest quality and powerful free network utilities in the cybersecurity professional's arsenal.Though this product is extremely well documented and demonstrated in many other courses, there are very few that provide a deep-dive into all its capabilities, functionality, use cases, and features. This comprehensive course will make you an expert in Nmap and arm you with the knowledge and skills necessary to make you a better network administrator and cybersecurity professional. Whether you are relatively new to networking, or a seasoned expert, this course will expand your knowledge and/or provide an excellent reference for using Nmap for a multitude of purposes. Are you a network administrator? Nmap can be your source for creating a detailed inventory of network assets. Are you a network security admin or incident responder? Nmap can help find the sources of almost every problem (threats, threat actors, and vulnerabilities) and help you eliminate them. Are you a penetration tester or ethical hacker? Nmap may be the single most important tool you can use to perform scanning, enumeration, banner grabbing, device fingerprinting and vulnerability scanning while evading firewalls and intrusion detection. Are you studying for a certification test? This course will provide you with detailed explanations of the most important Nmap commands and help you memorize them for test day.

Train Your Team

Cybrary’s expert-led cybersecurity courses help your team remediate skill gaps and get up-to-date on certifications. Utilize Cybrary to stay ahead of emerging threats and provide team members with clarity on how to learn, grow, and advance their careers within your organization.

Included in a Path

Instructors

No items found.
Learn

Learn core concepts and get hands-on with key skills.

Practice

Exercise your problem-solving and creative thinking skills with security-centric puzzles

Prove

Assess your knowledge and skills to identify areas for improvement and measure your growth

Get Hands-on Learning

Put your skills to the test in virtual labs, challenges, and simulated environments.

Measure Your Progress

Track your skills development from lesson to lesson using the Cybrary Skills Tracker.

Connect with the Community

Connect with peers and mentors through our supportive community of cybersecurity professionals.

Success from Our Learners

"Cybrary really helped me get up to speed and acquire a baseline level of technical knowledge. It offers a far more comprehensive approach than just learning from a book. It actually shows you how to apply cybersecurity processes in a hands-on way"

Don Gates

Principal Systems Engineer/SAIC

"Cybrary’s SOC Analyst career path was the difference maker, and was instrumental in me landing my new job. I was able to show the employer that I had the right knowledge and the hands-on skills to execute the role."

Cory

Cybersecurity analyst/

"I was able to earn my CISSP certification within 60 days of signing up for Cybrary Insider Pro and got hired as a Security Analyst conducting security assessments and penetration testing within 120 days. This certainly wouldn’t have been possible without the support of the Cybrary mentor community."

Mike

Security Engineer and Pentester/

"Cybrary really helped me get up to speed and acquire a baseline level of technical knowledge. It offers a far more comprehensive approach than just learning from a book. It actually shows you how to apply cybersecurity processes in a hands-on way"

Don Gates

Principal Systems Engineer/SAIC

"Cybrary’s SOC Analyst career path was the difference maker, and was instrumental in me landing my new job. I was able to show the employer that I had the right knowledge and the hands-on skills to execute the role."

Cory

Cybersecurity analyst/

"I was able to earn my CISSP certification within 60 days of signing up for Cybrary Insider Pro and got hired as a Security Analyst conducting security assessments and penetration testing within 120 days. This certainly wouldn’t have been possible without the support of the Cybrary mentor community."

Mike

Security Engineer and Pentester/

"Becoming a Cybrary Insider Pro was a total game changer. Cybrary was instrumental in helping me break into cybersecurity, despite having no prior IT experience or security-related degree. Their career paths gave me clear direction, the instructors had real-world experience, and the virtual labs let me gain hands-on skills I could confidently put on my resume and speak to in interviews."

Cassandra

Information Security Analyst/Cisco Systems

"I was able to earn both my Security+ and CySA+ in two months. I give all the credit to Cybrary. I’m also proud to announce I recently accepted a job as a Cyber Systems Engineer at BDO... I always try to debunk the idea that you can't get a job without experience or a degree."

Casey

Cyber Systems Engineer/BDO

"Cybrary has helped me improve my hands-on skills and pass my toughest certification exams, enabling me to achieve 13 advanced certifications and successfully launch my own business. I love the practice tests for certification exams, especially, and appreciate the wide-ranging training options that let me find the best fit for my goals"

Angel

Founder,/ IntellChromatics.

NMAP

The network mapper (NMAP) is one of the highest quality and powerful free network utilities in the cybersecurity professional's arsenal. This NMAP course offers the NMAP skills and commands needed to become a better network administrator, incident responder, or penetration tester. Learn NMAP fundamentals and even create personal hands-on labs.
6
17
M
Time
beginner
difficulty
7
ceu/cpe

Course Content

Course Description

The network mapper (Nmap) is one of the highest quality and powerful free network utilities in the cybersecurity professional's arsenal.Though this product is extremely well documented and demonstrated in many other courses, there are very few that provide a deep-dive into all its capabilities, functionality, use cases, and features. This comprehensive course will make you an expert in Nmap and arm you with the knowledge and skills necessary to make you a better network administrator and cybersecurity professional. Whether you are relatively new to networking, or a seasoned expert, this course will expand your knowledge and/or provide an excellent reference for using Nmap for a multitude of purposes. Are you a network administrator? Nmap can be your source for creating a detailed inventory of network assets. Are you a network security admin or incident responder? Nmap can help find the sources of almost every problem (threats, threat actors, and vulnerabilities) and help you eliminate them. Are you a penetration tester or ethical hacker? Nmap may be the single most important tool you can use to perform scanning, enumeration, banner grabbing, device fingerprinting and vulnerability scanning while evading firewalls and intrusion detection. Are you studying for a certification test? This course will provide you with detailed explanations of the most important Nmap commands and help you memorize them for test day.

This course is part of a Career Path:
Become a SOC Analyst - Level 2
This Career Path is for a Security Operations Center Analyst (SOC Analyst). This particular Career Path covers a more intermediate-level SOC role. As a SOC Analyst, your primary duty is to ensure that the organization’s digital assets are secure and protected from unauthorized access. That means that you are responsible for protecting both online and on-premise infrastructures, monitoring data to identify suspicious activity, and identifying and mitigating risks before there is a breach. In the event that a breach does occur, a SOC analyst will be on the front line, working to counter the attack. This career path is aligned to the Cyber Defense Incident Responder NICE/NIST Work Role.

Instructed by

Provider
Cybrary Logo
Certification Body
Certificate of Completion

Complete this entire course to earn a NMAP Certificate of Completion