Footprinting the LAN network is a big mystery for pentesters. In this course, Internal Footprinting: Reconnaissance and Mapping, you will learn the foundational knowledge of how to use Nmap to scan the LAN network like a boss. Also, you will gain the ability to take your Nmap scanning skills to the next level to get the job done efficiently. First, you will see how to identify live hosts. Next, you will discover how to identify the service version and get the operating system version accurately. Finally, you will explore how to automate your scanning tasks using Python for fast effective results. When you’re finished with this course, you will have the skills and knowledge of LAN Network footprinting needed in your career as a security professional.
Course Overview (Music) Hi, everyone. This is Gus, and welcome to this course of Internal Network Footprinting. Scanning the LAN network has a lot of tricks. Most probably, you've used Nmap for this task, and in this course, I will show you how to take your skills in Nmap to the next level. I know you want to learn about this topic, and that's why you're watching this video, right? In each lesson, we are going to see together how to apply things in practice. Some of the major topics that we will cover include network host discovery, identifying the service versions, fingerprinting the operating system accurately. Also, you will learn Python automation for LAN network scanning, and much, much more. When finishing all the modules in this course, you will start using Nmap like a boss. Before beginning this amazing journey, you should be familiar with the essentials of Python, but don't worry. I will walk you through all the details. Join me on this course to learn some exciting stuff using Nmap to get the job done.