April Learning Carnival is here, Use code FEST10 for an extra 10% off

Pentesting basic with nmap

person icon M Kumar


Pentesting basic with nmap

Unhide the power of Nmap

updated on icon Updated on Apr, 2024

language icon Language - English

person icon M Kumar

category icon Ethical Hacking,Cyber Security,IT & Software

Lectures -19

Duration -57 mins



30-days Money-Back Guarantee

Training 5 or more people ?

Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.

Course Description

Welcome to the Nmap Course!

Nmap is the Internet's most popular network scanner with advanced features that most people don't know even exist!

Discover the secrets of network discovery, using Nmap on this course.

Nmap is an indispensable tool that all techies should know well. It is used by all good ethical hackers, penetration testers, systems administrators, and anyone in fact who wants to discover more about the security of a network and its hosts.

You cannot be a good ethical hacker or systems administrator without being an expert in Nmap.

You will go from beginner to expert in easy-to-follow structured steps

The ideal student for this course is technically minded with an interest in ethical hacking and network security.

At the end of this course, you'll have a practical skill-set in using Nmap to scan networks. and will get bit insight about network pentesting

This Course is for you if you're:

  • Anyone interested in network security.
  • Techies, ethical hackers, penetration testers and systems administrators.
  • Those wanting to become ethical hackers, penetration testers and systems administrators.

About Nmap

Nmap is used to discover hosts and services on a computer network by sending packets and analyzing the responses.

Nmap provides a number of features for probing computer networks, including host discovery and service and operating system detection. These features are extensible by scripts that provide more advanced service detection, vulnerability detection, and other features. Nmap can adapt to network conditions including latency and congestion during a scan.

Nmap started as a Linux utility and was ported to other systems including Windows, macOS, and BSD. It is most popular on Linux, followed by Windows.

happy hacking


What will you learn in this course:

  • How does nmap work

  • Basics of Network pentesting

  • Detailed insight about nmap command line

  • How to use nmap along with multiple parameters


What are the prerequisites for this course?

  • Basics of linux and it's Command line

Pentesting basic with nmap


Check out the detailed breakdown of what’s inside the course

3 Lectures
  • play icon Course Introduction 03:14 03:14
  • play icon Introduction to Nmap 02:50 02:50
  • play icon Why use Nmap 03:49 03:49
Commands and Scanning
8 Lectures
Verbosity and exporting scan results
3 Lectures
5 Lectures

Instructor Details

M Kumar

M Kumar

A man with his laptop, who think he can change the world

Hi my self M Kumar, I'm a part of VIEH Group family, 

In my free time I do work as a crime investigator

At VIEH Group I usually work in the Security team, help other members in finding different security flaws and vulnerabilities.

I like replying tweets, so can ask me any question over Twitter @mkumarcyber

Course Certificate

Use your certificate to make a career change or to advance in your current career.

sample Tutorialspoint certificate

Our students work
with the Best

Related Video Courses

View More

Annual Membership

Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses

Subscribe now
Annual Membership

Online Certifications

Master prominent technologies at full length and become a valued certified professional.

Explore Now
Online Certifications

Talk to us