Description
Course info
Level
Intermediate
Updated
Dec 31, 2019
Duration
1h 3m
Description

Conducting an information security audit can be a lengthy and in-depth process. In this course, Maximizing Nmap for Security Auditing, you will learn how to leverage the capabilities of Nmap. First, you will discover how to use Nmap to find network hosts and potential vulnerabilities. Next, you will see how to leverage the Nmap scripting engine to increase Nmap’s capabilities. Finally, you will create custom solutions to increase your productivity and the effectiveness of the audit. When you are finished with this course, you will be ready to effectively implement Nmap in your information security audits.

About the author
About the author

Matt Glass is a Multi-national Systems Integrator in Stuttgart, Germany, working as a government contractor. He has been working in the IT field for the last eight years.

More from the author
More courses by Matt Glass
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
[Autogenerated] Hello, I'm that glass and welcome to my course maximizing and map for security auditing. I'm a senior system engineer working with a defense contractor in Studio Art Germany. Testing network security controls and discovering vulnerabilities are important parts of any organization, security plan and map. Our network mapper is a tool that's been around for more than 20 years and continues to expand its capabilities. In previous courses, we explored and mapped scanning phases, capabilities and uses in testing security controls on network devices in maximizing and Matt for security auditing. You'll expand on the concepts covered in the previous and math courses and dive deeper into end Matt scripting capabilities. In this course, we will not only discuss how to use different and map options, but also how to incorporate and map into shell scripts toe automate auditing tasks. This course also introduces you to creating your own custom and map scripts to use in the end match scripting engine, and also how to modify existing built in scripts to Taylor output to your reporting requirements. This course is the next step on your journey to understanding and effectively implementing end up, so it's recommended that you have some Familiarization with the tool, or watch the getting started course and testing security controls and detecting vulnerabilities with that map before you begin this one. All the examples in this course are run from a Lennox command line. The gooey version is available and can be used if that is your preference. In addition to and Matt Familiarization, it is recommended that you have a basic understanding of I P version for address ING ports protocols and variable length sudden ending. Before taking this course, I really enjoyed creating this course, and I hope you enjoy watching.