Free

NMAP

The network mapper (NMAP) is one of the highest quality and powerful free network utilities in the cybersecurity professional's arsenal. This NMAP course offers the NMAP skills and commands needed to become a better network administrator, incident responder, or penetration tester. Learn NMAP fundamentals and even create personal hands-on labs.
6
17
M
Time
beginner
difficulty
7
ceu/cpe

Course Content

Timing and Performance Part 2 - NM

7m

Module 4: Network Scanning and Discovery
Timing and Performance Part 1 - NM

5m

Module 4: Network Scanning and Discovery
NSE, Vulnerability Testing & Exploitation - NM

10m

Module 4: Network Scanning and Discovery
NSE, Vulnerability Testing & Exploitation Part 2 - NM

13m

Module 4: Network Scanning and Discovery
NSE, Vulnerability Testing & Exploitation Part 1 - NM

6m

Module 4: Network Scanning and Discovery
Host Discovery Part 2 - NM

14m

Module 4: Network Scanning and Discovery
Operating System Detection and Fingerprinting Part 1 - NM

10m

Module 4: Network Scanning and Discovery
Service and Application Version Detection Part 2 - NM

10m

Module 4: Network Scanning and Discovery
Service and Application Version Detection Part 1 - NM

12m

Module 4: Network Scanning and Discovery
TCP & UDP Port Scanning Lab Part 2

10m

Module 4: Network Scanning and Discovery
TCP & UDP Port Scanning Lab Part 1 - NM

9m

Module 4: Network Scanning and Discovery
TCP & UDP Port Scanning - NM

8m

Module 4: Network Scanning and Discovery
Host Discovery Part 2 - NM

10m

Module 4: Network Scanning and Discovery
Host Discovery Part 1 - NM

8m

Module 4: Network Scanning and Discovery
Scan Techniques Lab - NM

16m

Module 4: Network Scanning and Discovery
Scan Techniques - NM

11m

Module 4: Network Scanning and Discovery
Target Specification Lab Part 2 - NM

9m

Module 4: Network Scanning and Discovery
Target Specification Lab Part 1 - NM

11m

Module 4: Network Scanning and Discovery
Target Specification Review+ - NM

4m

Module 4: Network Scanning and Discovery
Nmap & IPv6 - NM

5m

Module 3: Nmap & The TCP/IP Protocol Suite
Nmap and Wireshark Part 2 - NM

14m

Module 3: Nmap & The TCP/IP Protocol Suite
Nmap and Wireshark Part 1 - NM

10m

Module 3: Nmap & The TCP/IP Protocol Suite
IP, TCP, UDP, and ICMP Headers - NM

11m

Module 3: Nmap & The TCP/IP Protocol Suite
IPv4 for Nmap - NM

8m

Module 3: Nmap & The TCP/IP Protocol Suite
Course Description

The network mapper (Nmap) is one of the highest quality and powerful free network utilities in the cybersecurity professional's arsenal.Though this product is extremely well documented and demonstrated in many other courses, there are very few that provide a deep-dive into all its capabilities, functionality, use cases, and features. This comprehensive course will make you an expert in Nmap and arm you with the knowledge and skills necessary to make you a better network administrator and cybersecurity professional. Whether you are relatively new to networking, or a seasoned expert, this course will expand your knowledge and/or provide an excellent reference for using Nmap for a multitude of purposes. Are you a network administrator? Nmap can be your source for creating a detailed inventory of network assets. Are you a network security admin or incident responder? Nmap can help find the sources of almost every problem (threats, threat actors, and vulnerabilities) and help you eliminate them. Are you a penetration tester or ethical hacker? Nmap may be the single most important tool you can use to perform scanning, enumeration, banner grabbing, device fingerprinting and vulnerability scanning while evading firewalls and intrusion detection. Are you studying for a certification test? This course will provide you with detailed explanations of the most important Nmap commands and help you memorize them for test day.

This course is part of a Career Path:
Become a SOC Analyst - Level 2
This Career Path is for a Security Operations Center Analyst (SOC Analyst). This particular Career Path covers a more intermediate-level SOC role. As a SOC Analyst, your primary duty is to ensure that the organization’s digital assets are secure and protected from unauthorized access. That means that you are responsible for protecting both online and on-premise infrastructures, monitoring data to identify suspicious activity, and identifying and mitigating risks before there is a breach. In the event that a breach does occur, a SOC analyst will be on the front line, working to counter the attack. This career path is aligned to the Cyber Defense Incident Responder NICE/NIST Work Role.

Instructed by

Instructor
Rob Thurston

As I get older, I realize that I’m pretty much a product of my upbringing and my generation (Gen X), though I hate labelling others in that way. I’ve been happily married to my best friend Lisa for almost 20 years, and enjoy every day with my 5 children, 1 grand-child, 2 dogs and about 25 fish. I’ve been re-invigorated in my IT career several times and am so excited to make an impact on the lives and livelihood of colleagues. This carries over to the amazing company I work for as well. I’m the CIO of a really cool engineering design and manufacturing company in the Dallas/Fort Worth metroplex in Texas. Securing their network against persistent threats is an every-day challenge. As an IT leader, I work very hard to maintain a balance between technical savvy, business and financial responsibility (especially aligning IT with company strategy), and the long-term development of my people. I find this challenging, exciting, and very rewarding.

Provider
Cybrary Logo
Certification Body
Certificate of Completion

Complete this entire course to earn a NMAP Certificate of Completion