6 hours 31 minutes
Let's do a quick overview of this course and some of the things that you should be familiar with before starting.
Theodore, the creator of In Map, published a book, A While Back On and Map.
Many of the chapters were available on the End Map website
a couple of weeks ago. I got an email from him saying that the entire book is now available on the site for free with recent updates.
This course will generally follow the outline of the book
will be performing a lot of different scans from the command line and the Zen map. Gooey.
These will work from almost any computer
you're in Module one now, which is the course introduction
module to Will Cover and Matt Basics, including installing in removing and map
running scans from the command line and an intro to the Zen map. Gooey
Module three will go over the D. C P I. P Protocol. Sweet
Well, look a TCP UDP and ICMP headers and how n map crafts I P packets to solicit informed responses.
Well, then examine these packets and wire shark.
Then we'll discuss and map an I. P V six
in Module four will perform some of the most popular scans that people use and map for
host Discovery Port scanning
service, an application version detection
and OS detection and fingerprinting.
We'll finish that module by performing at least one vulnerability assessment and penetration test using only and map.
It would help you a lot if you meet at least two of these three prerequisites.
That doesn't mean that you won't be able to follow along and learn a ton of useful things. If you don't go
understanding how t C P I P works, including addressing topics like sub netting. Insider notation would be helpful.
Also, understanding the difference between TCP and UDP and common ports used by both to communicate would be good.
If you have 3 to 5 years of experience in the technical service is role in I t. You almost certainly will have gained enough knowledge to breeze through this course.
The Camp Tia
Network Plus and Security plus both cover everything you need to know to get a lot out of this course.
I've included the Cisco, Susie and a here because it goes above and beyond what you need to know about how T's P I. P functions on a land and over when connections and the Internet.
In this lesson, we've talked about what you'll learn in this course,
and we've gone over the stuff you need to know to get the most out of it.
Now let's get started with installing and map and running some scans.
The network mapper (NMAP) is one of the highest quality and powerful free network utilities in the cybersecurity professional's arsenal.