Course Description
In Scanning and Enumeration with NMAP, Ken Underhill gives an overview of scanning and the scanning methodology, which is the process of collecting information on a network using technical tools. Ken Underhill uses an Nmap lab to demonstrate this process. Nmap is a powerful tool used by both attackers and defenders to scan networks.
Learning Objectives
In Scanning and Enumeration with NMAP, Ken Underhill gives an overview of scanning and the scanning methodology, which is the process of collecting information on a network using technical tools. Ken Underhill uses an Nmap lab to demonstrate this process. Nmap is a powerful tool used by both attackers and defenders to scan networks.
Framework Connections
Specialty Areas
- Cyber Defense Analysis
- Cyber Defense Infrastructure Support
- Exploitation Analysis
Feedback
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.