Scanning and Enumeration with NMAP
NMAP is a powerful tool used by both attackers and defenders to scan networks. In this Scanning and Enumeration with NMAP course, Ken Underhill uses an NMAP lab to demonstrate the process for collecting information on a network using technical tools. Become a more advanced incident handler with this course.
Already have an account? Sign In »

Module 1: Scanning and Enumeration with NMAP
In Scanning and Enumeration with NMAP, Ken Underhill gives an overview of scanning and the scanning methodology, which is the process of collecting information on a network using technical tools. Ken Underhill uses an Nmap lab to demonstrate this process. Nmap is a powerful tool used by both attackers and defenders to scan networks.

Ken Underhill


Complete this entire course to earn a Scanning and Enumeration with NMAP Certificate of Completion
See the full benefits of our immersive learning experience with interactive courses and guided career paths.