• Online, Self-Paced
Course Description

Description
A step-by-step tutorial to gain expertise in Nmap

You will learn how to use this tool to implement a wide variety of practical tasks related to pentesting and network monitoring. The tutorial will start with installation techniques and then explain Nmap fundamentals. Moving on, we will cover the advanced functionalities of Nmap Scripting Engine (NSE) such as libraries, scripts, APIs, and so on. You will be able to perform custom tasks, the fundamentals of Lua programming, scanning mail servers, scanning databases, windows machines, SCADA systems, and large networks.

About The Author

Fotis Chantzis is currently an information security engineer at Mayo Clinic. He has also been a part of the main Nmap development team since 2009, when he wrote Ncrack. He also worked with the author of Nmap when he successfully completed the Google summer code 2010. He also represented Nmap at the Google Mentor Summit in October 2016. He is passionate about computer security and has even has his own startup Primavista.

Learning Objectives

Learn network security concepts that are required to properly comprehend and grasp how all Nmap utilities work the way they do
Handle large numbers of results from scanning large networks
IT administrators can effectively monitor their network for critical changes that might lead to potential vulnerabilities, by comparing the results from everyday scans
Master the Nmap Scripting Engine (NSE) by writing new (and customizing existing) Lua scripts that further extend Nmap's capabilities
Utilize the Nmap suite's accompanying tools to refine and effectively automate your everyday network tasks, including debugging, visualizing, monitoring, and network auditing
Conduct host discovery, port scanning, and version and OS detection for every system in your network

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.