Testing Security Controls and Detecting Vulnerabilities with Nmap

This course will help you will learn how to leverage the capabilities of Nmap to find insecure applications and explore the weaknesses in your organization’s firewalls.
Course info
Rating
(10)
Level
Intermediate
Updated
Feb 8, 2019
Duration
1h 39m
Table of contents
Description
Course info
Rating
(10)
Level
Intermediate
Updated
Feb 8, 2019
Duration
1h 39m
Description

Testing network security controls and discovering vulnerabilities are important parts of any organizations security plan. In this course, Testing Security Controls and Detecting Vulnerabilities with Nmap, you will learn how to do just that. First, you will learn how Nmap conducts host discovery. Next, you will see how to perform port scans. Finally, you will learn how Nmap detects applications and operating systems. After finishing this course, you will know how to leverage the capabilities of Nmap to find insecure applications and explore the weaknesses in your organization’s network security devices.

About the author
About the author

Matt Glass is a Multi-national Systems Integrator in Stuttgart, Germany, working as a government contractor. He has been working in the IT field for the last eight years.

More from the author
Maximizing Nmap for Security Auditing
Intermediate
1h 3m
Dec 31, 2019
More courses by Matt Glass
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hello. I'm Matt Glass, and welcome to my course, Testing Security Controls and Detecting Vulnerabilities with Nmap. I'm a network and system engineer working with a defense contractor in Stuttgart, Germany. Testing network security controls and discovering vulnerabilities are important parts of any organization's security plan. Nmap, or Network Mapper, is a tool that's been around for more than 20 years and continues to expand its capabilities. This versatile tool may seem intimidating to learn at first, but its operation can be broken down into phases that are easy to understand and implement. In Testing Security Controls and Detecting Vulnerabilities with Nmap, you'll expand on the concepts covered in the Getting Started with Nmap course and explore all the different command options and features available for host discovery and vulnerability detection. In this course, we will not only discuss the uses of different options, but we'll also explain how each feature works to detect a host, port status, application version, operating system, or potential vulnerability. This course also introduces you to techniques to bypass poorly configured network security devices, as well as the Nmap scripting engine, which allows for extensive customization. This course is the next step on your journey to understanding and effectively implementing Nmap, so it's recommended that you have some familiarization with the tool or watch the Getting Started course before beginning this one. While all the examples in this course are run from a Linux command line, the GUI version is available and can be used if that is your preference. In addition to Nmap familiarization, it is recommended that you have a basic understanding of IP version 4 addressing, ports, protocols, and variable length subnetting before taking this course. I really enjoyed creating this course, and I hope you enjoy watching it.