Ethical Hacking: nmap in depth

Ethical Hacking: nmap in depth

Ethical Hacking: nmap in depth

network discovery and exploitation

Language: english

Note: 4.3/5 (113 notes) 18,832 students

Instructor(s): Peter A

Last update: 2021-09-03

What you’ll learn

  • Network sweeping with nmap
  • Enumerate network services
  • Use NSE with nmap
  • Attack network with NSE

 

Requirements

  • No prior knowledge required

 

Description

When it comes to hacking, knowledge is power. So how do you get more knowledge about your target system? One answer is nmap, a command line tool for Ethical Hackers.

nmap (“network mapper”) is a security scanner (port scanner) tool for *nix based operating systems. The program attempts to determine which ports on the machine listening and which services (application name and version) the machine is offering information. nmap offers a number of features, including the following:

Port scanning, OS detection, version detection, script scanning, traceroute hostname detection, reverse DNS lookup, ping sweeping, and reserved IP address detection.

This course will introduce you to nmap, you will be able to find out which targets are in the network, which network services are running and you’ll be able to carry out attacks to those systems.

This is a beginners course, you don’t need any prior knowledge but if you have some knowledge on computer networks that’s beneficial. The course does not contain any programming, it focuses only on network scanning and attacks.

The course contains theory, videos and quizes to make sure you understand all the concepts.

If you want to learn more about Ethical Hacking and are a beginner, this course is for you. What are you waiting for? Let’s hack

 

Who this course is for

  • Beginner Ethical Hackers

 

Course content

  • Introduction
    • Introduction
    • Install nmap
  • Scanning
    • Introduction
    • Quiz
    • Basic scan
    • Basic scan
    • More basics
    • Quiz flags
  • Scan types
    • Introduction
    • Quiz
    • Scan types
    • TCP scan
    • UDP scan
    • Stealth scans
  • Scripting
    • Introduction
    • Scripts
    • Vulnerability scanning
    • Brute force scripts

 

Time remaining or 848 enrolls left

 

Don’t miss any coupons by joining our Telegram group 

Udemy Coupon Code 100% off | Udemy Free Course | Udemy offer | Course with certificate