Course info
Dec 9, 2020
Your 10-day individual free trial includes:

Expert-led courses

Keep up with the pace of change with thousands of expert-led, in-depth courses.

Testing network security controls and discovering vulnerabilities are important parts of an organization's security plan. In this course, Scanning for Vulnerabilities with Nmap Scripting Engine (NSE), you’ll learn to leverage the NSE and write custom scripts for Nmap. First, you’ll explore built-in NSE scripts. Next, you’ll discover network vulnerabilities of different types. Finally, you’ll learn how to write custom NSE scripts to detect and exploit vulnerabilties. When you’re finished with this course, you’ll have the skills and knowledge of the Nmap Scripting Engine needed to detect network vulnerabilities and write custom scripts.

About the author
About the author

Matt Glass is an IT Project Manager in Stuttgart, Germany, working as a government contractor. He has more than 12 years of IT experience in a variety of roles.

More from the author
Impact with Low Orbit Ion Cannon (LOIC)
Sep 30, 2021
Manage Suricata Rule Sets and Rule Sources
1h 6m
Apr 27, 2021
Suricata: Getting Started
1h 12m
Dec 14, 2020
More courses by Matt Glass
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hello, everyone. My name is Matt Glass, and welcome to my course, Scanning for Vulnerabilities with Nmap Scripting Engine. I'm an IT project manager at Leidos, working in Stuttgart, Germany. Nmap, or Network Mapper, is a tool that's been around for more than 20 years and continues to expand its capabilities. The Nmap Scripting Engine allows you to gather more details from open ports, and in some cases, check for available exploits or valuable information. In this course, we're expanding on the information covered in the rest of the Nmap series and focusing on the features available in the NSE. We'll use a variety of built‑in scripts, and write our own custom version to find information in a database. Some of the topics that we'll cover include testing authentication controls with Nmap, detecting and exploiting vulnerabilities with Nmap scripts, and creating a custom Nmap script to exploit a vulnerability. By the end of this course, you'll be able to conduct scans and leverage the Nmap Scripting Engine and even write your own scripts to find specific information. Before beginning this course, you should be familiar with Nmap's capabilities and operation from the command line, or you can always go back and watch the previous Nmap courses in the Information Security Testing and Auditing with Nmap Path. I hope you'll join me on this journey to learn about the Nmap Scripting Engine, with the Scanning for Vulnerabilities, with the Nmap Scripting Engine course, at Pluralsight.