Pentesting basic with nmap
Unhide the power of Nmap
Ethical Hacking,Cyber Security,IT & Software
Lectures -19
Duration -57 mins
30-days Money-Back Guarantee
Get your team access to 9000+ top Tutorials Point courses anytime, anywhere.
Course Description
Welcome to the Nmap Course!
Nmap is the Internet's most popular network scanner with advanced features that most people don't know even exist!
Discover the secrets of network discovery, using Nmap on this course.
Nmap is an indispensable tool that all techies should know well. It is used by all good ethical hackers, penetration testers, systems administrators, and anyone in fact who wants to discover more about the security of a network and its hosts.
You cannot be a good ethical hacker or systems administrator without being an expert in Nmap.
You will go from beginner to expert in easy-to-follow structured steps
The ideal student for this course is technically minded with an interest in ethical hacking and network security.
At the end of this course, you'll have a practical skill-set in using Nmap to scan networks. and will get bit insight about network pentesting
This Course is for you if you're:
- Anyone interested in network security.
- Techies, ethical hackers, penetration testers and systems administrators.
- Those wanting to become ethical hackers, penetration testers and systems administrators.
About Nmap
Nmap is used to discover hosts and services on a computer network by sending packets and analyzing the responses.
Nmap provides a number of features for probing computer networks, including host discovery and service and operating system detection. These features are extensible by scripts that provide more advanced service detection, vulnerability detection, and other features. Nmap can adapt to network conditions including latency and congestion during a scan.
Nmap started as a Linux utility and was ported to other systems including Windows, macOS, and BSD. It is most popular on Linux, followed by Windows.
happy hacking
Goals
What will you learn in this course:
How does nmap work
Basics of Network pentesting
Detailed insight about nmap command line
How to use nmap along with multiple parameters
Prerequisites
What are the prerequisites for this course?
Basics of linux and it's Command line
Curriculum
Check out the detailed breakdown of what’s inside the course
Introduction
3 Lectures
- Course Introduction 03:14 03:14
- Introduction to Nmap 02:50 02:50
- Why use Nmap 03:49 03:49
Commands and Scanning
8 Lectures
Verbosity and exporting scan results
3 Lectures
Extras
5 Lectures
Instructor Details
M Kumar
A man with his laptop, who think he can change the worldHi my self M Kumar, I'm a part of VIEH Group family,
In my free time I do work as a crime investigator
At VIEH Group I usually work in the Security team, help other members in finding different security flaws and vulnerabilities.
I like replying tweets, so can ask me any question over Twitter @mkumarcyber
Course Certificate
User your certification to make a career change or to advance in your current career. Salaries are among the highest in the world.
Our students work
with the Best
Related Video Courses
View MoreAnnual Membership
Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses
Subscribe nowOnline Certifications
Master prominent technologies at full length and become a valued certified professional.
Explore Now