• Online, Self-Paced
Course Description

About this Course
In this course you will learn about computer network penetration testing using NMAP. NMAP is most popular tools in IT world. This tool is widely use by Computer Experts, Penetration Testers, Ethical Hackers, System Administrators, Network Engineers. This tool has great capability to collect information about computer networks. You will learn from lab setup to complete network scanning using NMAP. I will guide you step by step to prepare lab and use NMAP. This course will give you complete knowledge about network scanning. After completion of this course you will be able to find vulnerabilities of network. This course is complete ethical hacking and penetration testing based course. To be a good ethical hacker or penetration tester, you must have knowledge about NMAP. I am using kali linux as platform to demonstrate all the lectures. This course will give you complete knowledge about full scan,half scan,three-way handshake process,FIN scan,XMAS scan,TCP scan,UDP scan,IDLE scan, Null Scan. This course will help a lot to those who are already working as IT engineers and who wants to start their career in the field of penetration testing or ethical hacking. Computer network scanning is a most important phase of ethical hacking. You will learn complete network scanning using open source based tool.

One of the most important feature that Nmap has ability to detect remote operating systems and software. It is very helpful during a penetration testing to know about the operating system and the software used by the remote computer because you can easily predict the known vulnerabilities from this information.

Basic knowledge
Students must have knowledge about computer networks
Computer network security knowledge will be advantage

Learning Objectives

Students will learn to scan entire computer network in their organization or company
Student will learn about complete network scanning using NMAP
Objective of network scanning
To find live hosts,ports,ip address of live host
To discover operating system on target host
To discover services running on hosts
To find vulnerabilities
What is ping
What is ping sweep
Three-way handshake
TCP communication flag
Different type of scanning concepts
TCP based scanning
UDP based scanning
Preparing lab setup at your home
Host discovery
Port scanning basics
Port scanning techniques
Port specification and scan order
Service and version detection
OS detection
NMAP scripting engine
Timing and performance
Firewall/IDS evasion and spoofing

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.