Testing Security Controls and Detecting Vulnerabilities with Nmap

This course will help you will learn how to leverage the capabilities of Nmap to find insecure applications and explore the weaknesses in your organization’s firewalls.
Course info
Level
Intermediate
Updated
Feb 8, 2019
Duration
1h 39m
Table of contents
Description
Course info
Level
Intermediate
Updated
Feb 8, 2019
Duration
1h 39m
Description

Testing network security controls and discovering vulnerabilities are important parts of any organizations security plan. In this course, Testing Security Controls and Detecting Vulnerabilities with Nmap, you will learn how to do just that. First, you will learn how Nmap conducts host discovery. Next, you will see how to perform port scans. Finally, you will learn how Nmap detects applications and operating systems. After finishing this course, you will know how to leverage the capabilities of Nmap to find insecure applications and explore the weaknesses in your organization’s network security devices.

About the author
About the author

Matt Glass is a Multi-national Systems Integrator in Stuttgart, Germany, working as a government contractor. He has been working in the IT field for the last eight years.

More from the author
Getting Started with Nmap
Beginner
1h 26m
Oct 5, 2018
Vulnerability Management: The Big Picture
Beginner
1h 38m
Sep 27, 2017
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hello. I'm Matt Glass, and welcome to my course, Testing Security Controls and Detecting Vulnerabilities with Nmap. I'm a network and system engineer working with a defense contractor in Stuttgart, Germany. Testing network security controls and discovering vulnerabilities are important parts of any organization's security plan. Nmap, or Network Mapper, is a tool that's been around for more than 20 years and continues to expand its capabilities. This versatile tool may seem intimidating to learn at first, but its operation can be broken down into phases that are easy to understand and implement. In Testing Security Controls and Detecting Vulnerabilities with Nmap, you'll expand on the concepts covered in the Getting Started with Nmap course and explore all the different command options and features available for host discovery and vulnerability detection. In this course, we will not only discuss the uses of different options, but we'll also explain how each feature works to detect a host, port status, application version, operating system, or potential vulnerability. This course also introduces you to techniques to bypass poorly configured network security devices, as well as the Nmap scripting engine, which allows for extensive customization. This course is the next step on your journey to understanding and effectively implementing Nmap, so it's recommended that you have some familiarization with the tool or watch the Getting Started course before beginning this one. While all the examples in this course are run from a Linux command line, the GUI version is available and can be used if that is your preference. In addition to Nmap familiarization, it is recommended that you have a basic understanding of IP version 4 addressing, ports, protocols, and variable length subnetting before taking this course. I really enjoyed creating this course, and I hope you enjoy watching it.