This Course is part of a Career Path: Become a Penetration Tester

Course Content

Module 1: Introduction

04:35
1.1 Nmap: What It Is and Why It's Important - NM
02:15
1.2 About the Instructor - NM
02:37
1.3 Course Overview and Prerequisites - NM
10:06
1.4 Ethics and Legality of Scanning - NM

Module 2: Nmap Basics

07:20
2.1 Installing Nmap on Windows - NM
09:37
2.2 Installing Nmap on Linux - NM
10:13
2.3 Installing Nmap on Mac - NM
05:20
2.4 Kali Linux: A Hacker's Best Friend - NM
09:20
2.5 Kali Linux Lab: Running it Live - NM
08:42
2.6 Removing Nmap from Windows - NM
02:51
2.7 Removing Nmap from Linux - NM
04:07
2.8 Removing Nmap from Mac - NM
11:09
2.9 Getting Help - NM
11:30
2.10 Phases of the Nmap Scan - NM
11:23
2.11 Constructing an Nmap Scan - NM
07:42
2.12 2.12.1 Constructing an Nmap Scan Lab Part 1 - NM
10:13
2.13 2.12.2 Constructing an Nmap Scan Lab Part 2 - NM
10:56
2.14 General Considerations - NM
08:35
2.15 2.14.1 Custom Scan Profiles Part 1 - NM
08:13
2.16 2.14.2 Custom Scan Profiles Part 2 - NM

Module 3: Nmap & The TCP/IP Protocol Suite

08:11
3.1 IPv4 for Nmap - NM
11:26
3.2 IP, TCP, UDP, and ICMP Headers - NM
10:23
3.3 3.3.1 Nmap and Wireshark Part 1 - NM
14:00
3.4 3.3.2 Nmap and Wireshark Part 2 - NM
05:40
3.5 Nmap & IPv6 - NM

Module 4: Network Scanning and Discovery

04:10
4.1 Target Specification Review+ - NM
10:49
4.2 4.2.1 Target Specification Lab Part 1 - NM
08:48
4.3 4.2.2 Target Specification Lab Part 2 - NM
10:59
4.4 Scan Techniques - NM
15:27
4.5 Scan Techniques Lab - NM
08:42
4.6 4.5.1 Host Discovery Part 1 - NM
10:20
4.7 4.5.2 Host Discovery Part 2 - NM
07:48
4.8 TCP & UDP Port Scanning - NM
09:09
4.9 4.7.1 TCP & UDP Port Scanning Lab Part 1 - NM
10:21
4.10 4.7.2 TCP & UDP Port Scanning Lab Part 2
12:13
4.11 4.8.1 Service and Application Version Detection Part 1 - NM
10:15
4.12 4.8.2 Service and Application Version Detection Part 2 - NM
09:20
4.13 4.9.1 Operating System Detection and Fingerprinting Part 1 - NM
14:14
4.14 4.9.2 Host Discovery Part 2 - NM
05:48
4.15 4.10.1 NSE, Vulnerability Testing & Exploitation Part 1 - NM
13:20
4.16 4.10.2 NSE, Vulnerability Testing & Exploitation Part 2 - NM
10:24
4.17 4.10.3 NSE, Vulnerability Testing & Exploitation - NM
05:39
4.18 4.11.1 Timing and Performance Part 1 - NM
07:16
4.19 4.11.2 Timing and Performance Part 2 - NM

Course Description

The network mapper (Nmap) is one of the highest quality and powerful free network utilities in the arsenal of cybersecurity professionals. Though this product is extremely well documented and demonstrated in many other courses, there are very few that provide a deep-dive into all its capabilities, functionality, use cases, and features. This comprehensive course will make you an expert in Nmap and arm you with the knowledge and skills necessary to make you a better network administrator and cybersecurity professional. Whether you are relatively new to networking, or a seasoned expert, this course will expand your knowledge and/or provide an excellent reference for using Nmap for a multitude of purposes. Are you a network administrator? Nmap can be your source for creating a detailed inventory of network assets. Are you a network security admin or incident responder? Nmap can help find the sources of almost every problem (threats, threat actors, and vulnerabilities) and help you eliminate them. Are you a penetration tester or ethical hacker? Nmap may be the single most important tool you can use to perform scanning, enumeration, banner grabbing, device fingerprinting and vulnerability scanning while evading firewalls and intrusion detection. Are you studying for a certification test? This course will provide you with detailed explanations of the most important Nmap commands and help you memorize them for test day.