Getting Started with Nmap

Testing network security controls and discovering vulnerabilities are important parts of any organization's security plan. This course will help you learn how to use Nmap to discover network hosts and potential vulnerabilities.
Course info
Rating
(19)
Level
Beginner
Updated
Oct 5, 2018
Duration
1h 26m
Table of contents
Description
Course info
Rating
(19)
Level
Beginner
Updated
Oct 5, 2018
Duration
1h 26m
Description

Nmap, or network mapper, is a tool that has been around for more than 20 years. In this course, Getting Started with Nmap, you will learn how this versatile tool can be broken down into phases that are easily understood and implemented. First, you will go over Nmap installation and command structure. Next, you will move progressively through each scan phase until you are leveraging more advanced features. Finally, you will have the opportunity to apply what you learn to a scenario where you use Nmap to evaluate network devices. By the end of the course, you will have a basic understanding of how to use Nmap for internal security testing and will be running your own commands to detect applications running on your devices.

About the author
About the author

Matt Glass is a Multi-national Systems Integrator in Stuttgart, Germany, working as a government contractor. He has been working in the IT field for the last eight years.

More from the author
Vulnerability Management: The Big Picture
Beginner
1h 38m
Sep 27, 2017
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hello, I'm Matt Glass, and welcome to my course: Getting Started with Nmap. I am a network and system engineer working with a defense contractor in Stuttgart, Germany. Testing network security controls and discovering vulnerabilities are important parts of any organization's security plan. Nmap, or Network Mapper, is a tool that's been around for more than 20 years and continues to expand its capabilities. This versatile tool may seem intimidating to learn at first, but its operation can be broken down into phases that are easy to understand and implement. In Getting Started with Nmap, you'll learn how to use Nmap to discover network hosts and potential vulnerabilities. We'll start with Nmap installation and command structure, and progressively move through each scan phase until we're leveraging more advanced features. Throughout the course, you'll have the opportunity to apply what you learn to a scenario where you use Nmap to evaluate network devices. By the end of the course, you'll have a basic understanding of how to use Nmap for internal security testing, and you'll be running your own commands to detect applications running on your devices. This course is an introduction to Nmap, so no initial knowledge or prior use is required or expected. While all the examples in this course are run from the Linux command line, I also demonstrate how to install the GUI version, if that is your preference. Although you do not need any prior Nmap experience, it is helpful, though not required, if you have a basic understanding of IP version 4 addressing, ports, and variable length subnetting before taking this course. I really enjoyed creating this course, and I hope you enjoy watching it.