Hands-on experience in performing network scanning using Nmap
Network scanning is the process of assessing a network to identify an active host network, which will either be an attacker or a medium for security assessment. This procedure plays an extremely vital role in risk assessment programs or when preparing a security plan for your organization.
This course picks up where Learning Practical Network Scanning finished and focuses on the most widely available customization network scanning tool: Nmap. Sills learned with Nmap can be later applied to many other applications.
First, it starts by understanding various methods to define scanning targets. Next, the course covers understanding (and adjusting) how ports are scanned and applications and operating systems are detected. Later, it explains how to detect and bypass firewalls and perform scripting to make common tasks easy to repeat.
About the Author
Andrew Crouthamel is an experienced Senior Network Engineer and IT trainer who resides in Doylestown, PA, and currently works with organizations such as NASA, ESA, JAXA, Boeing, and the US Air Force. His passion for teaching shows in his courses, which are filled with excitement and real-world anecdotes.
For more information about him, please refer to the following links:
Learn how various Nmap detection algorithms function
Optimize Nmap to reduce your scan times and be as efficient as possible
Bypass firewalls and trick IDS to ensure your network scans work correctly
Learn how to create scripts to automate Nmap tasks