Free

NMAP

The network mapper (NMAP) is one of the highest quality and powerful free network utilities in the cybersecurity professional's arsenal. This NMAP course offers the NMAP skills and commands needed to become a better network administrator, incident responder, or penetration tester. Learn NMAP fundamentals and even create personal hands-on labs.
6
17
M
Time
beginner
difficulty
7
ceu/cpe

Course Content

Module 3: Nmap & The TCP/IP Protocol Suite
IPv4 for Nmap - NM

8m

Module 3: Nmap & The TCP/IP Protocol Suite
IP, TCP, UDP, and ICMP Headers - NM

11m

Module 3: Nmap & The TCP/IP Protocol Suite
Nmap and Wireshark Part 1 - NM

10m

Module 3: Nmap & The TCP/IP Protocol Suite
Nmap and Wireshark Part 2 - NM

14m

Module 3: Nmap & The TCP/IP Protocol Suite
Nmap & IPv6 - NM

5m

Module 3: Nmap & The TCP/IP Protocol Suite
Module 4: Network Scanning and Discovery
Target Specification Review+ - NM

4m

Module 4: Network Scanning and Discovery
Target Specification Lab Part 1 - NM

11m

Module 4: Network Scanning and Discovery
Target Specification Lab Part 2 - NM

9m

Module 4: Network Scanning and Discovery
Scan Techniques - NM

11m

Module 4: Network Scanning and Discovery
Scan Techniques Lab - NM

16m

Module 4: Network Scanning and Discovery
Host Discovery Part 1 - NM

8m

Module 4: Network Scanning and Discovery
Host Discovery Part 2 - NM

10m

Module 4: Network Scanning and Discovery
Course Description

The network mapper (Nmap) is one of the highest quality and powerful free network utilities in the cybersecurity professional's arsenal.Though this product is extremely well documented and demonstrated in many other courses, there are very few that provide a deep-dive into all its capabilities, functionality, use cases, and features. This comprehensive course will make you an expert in Nmap and arm you with the knowledge and skills necessary to make you a better network administrator and cybersecurity professional. Whether you are relatively new to networking, or a seasoned expert, this course will expand your knowledge and/or provide an excellent reference for using Nmap for a multitude of purposes. Are you a network administrator? Nmap can be your source for creating a detailed inventory of network assets. Are you a network security admin or incident responder? Nmap can help find the sources of almost every problem (threats, threat actors, and vulnerabilities) and help you eliminate them. Are you a penetration tester or ethical hacker? Nmap may be the single most important tool you can use to perform scanning, enumeration, banner grabbing, device fingerprinting and vulnerability scanning while evading firewalls and intrusion detection. Are you studying for a certification test? This course will provide you with detailed explanations of the most important Nmap commands and help you memorize them for test day.

This course is part of a Career Path:
Become a SOC Analyst - Level 2
This Career Path is for a Security Operations Center Analyst (SOC Analyst). This particular Career Path covers a more intermediate-level SOC role. As a SOC Analyst, your primary duty is to ensure that the organization’s digital assets are secure and protected from unauthorized access. That means that you are responsible for protecting both online and on-premise infrastructures, monitoring data to identify suspicious activity, and identifying and mitigating risks before there is a breach. In the event that a breach does occur, a SOC analyst will be on the front line, working to counter the attack. This career path is aligned to the Cyber Defense Incident Responder NICE/NIST Work Role.

Instructed by

No items found.
Provider
Cybrary Logo
Certificate of Completion

Complete this entire course to earn a NMAP Certificate of Completion

Coming mid-July
Cybrary Reimagined.
Level up with structured, role-aligned career paths.
ALL NEW!
Cybrary Reimagined.
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer!
Level up with structured, role-aligned career paths.
Valid until October 31. Elevate your skills today!
Start Now

Heading

Heading 1

Heading 2

Heading 3

Heading 4

Heading 5
Heading 6

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

Block quote

Ordered list

  1. Item 1
  2. Item 2
  3. Item 3

Unordered list

  • Item A
  • Item B
  • Item C

Text link

Bold text

Emphasis

Superscript

Subscript

This is some text inside of a div block.
Share

Purpose Statement

Cybrary Career Paths are comprehensive training programs designed to prepare you for the most in-demand roles in the cybersecurity workforce. Each path follows a Learn, Practice, Prove model and includes different activity types aligned to key topics within the path’s security domain. As you progress through the path, your progress will be measured in real time using Experience Points (XP) that serve as a comprehensive capability score for each topic. Upon completing all of the requirements for a path, you will be rewarded with a shareable digital badge via Credly.
This is some text inside of a div block.
This is some text inside of a div block.
M
Time
This is some text inside of a div block.
difficulty
This is some text inside of a div block.
ceu/cpe

Overview

Heading 1

Heading 2

Heading 3

Heading 4

Heading 5
Heading 6

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

Block quote

Ordered list

  1. Item 1
  2. Item 2
  3. Item 3

Unordered list

  • Item A
  • Item B
  • Item C

Text link

Bold text

Emphasis

Superscript

Subscript

Frequently Asked Questions
No items found.
What Will I Learn?
Foundations
Focused on the core IT competencies that cybersecurity professionals need to succeed in any career path.
Defensive Security
Focused on trying to find the bad guys. Topics such as threat intelligence, threat hunting, network monitoring, incident response. Defensive security is a reactive measure taken once a vulnerability is found through prevention, detection, and response.
Engineering and Operations
Focused on building and operating information systems.
Governance, Risk, and Compliance
Focused on the core IT competencies that cybersecurity professionals need to succeed in any career path.
Leadership and Management
Focused on program design and oversight. Covers project and program management.
Offensive Security
Focused on validating security controls by trying to break them (i.e. penetration testing or ethical hacking). Topics such as Kali Linux, metasploit, scanning, and privilege escalation. Offensive security seeks out the problem or vulnerability through ethical hacking and finds a solution to disable the operation.
Offensive Security
Focused on the core IT competencies that cybersecurity professionals need to succeed in any career path.
Path Outline

Heading 1

Heading 2

Heading 3

Heading 4

Heading 5
Heading 6

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

Block quote

Ordered list

  1. Item 1
  2. Item 2
  3. Item 3

Unordered list

  • Item A
  • Item B
  • Item C

Text link

Bold text

Emphasis

Superscript

Subscript

Course Outline

No items found.
No items found.
No items found.

What Our Learners Are Saying

Join 3 million+ users, including 96% of Fortune 1000 companies who use our platform to upskill their teams. See what the buzz is about - start learning for free!

No items found.