Testing network security controls and discovering vulnerabilities are important parts of any organizations security plan. In this course, Testing Security Controls and Detecting Vulnerabilities with Nmap, you will learn how to do just that. First, you will learn how Nmap conducts host discovery. Next, you will see how to perform port scans. Finally, you will learn how Nmap detects applications and operating systems. After finishing this course, you will know how to leverage the capabilities of Nmap to find insecure applications and explore the weaknesses in your organization’s network security devices.
Course Overview Hello. I'm Matt Glass, and welcome to my course, Testing Security Controls and Detecting Vulnerabilities with Nmap. I'm a network and system engineer working with a defense contractor in Stuttgart, Germany. Testing network security controls and discovering vulnerabilities are important parts of any organization's security plan. Nmap, or Network Mapper, is a tool that's been around for more than 20 years and continues to expand its capabilities. This versatile tool may seem intimidating to learn at first, but its operation can be broken down into phases that are easy to understand and implement. In Testing Security Controls and Detecting Vulnerabilities with Nmap, you'll expand on the concepts covered in the Getting Started with Nmap course and explore all the different command options and features available for host discovery and vulnerability detection. In this course, we will not only discuss the uses of different options, but we'll also explain how each feature works to detect a host, port status, application version, operating system, or potential vulnerability. This course also introduces you to techniques to bypass poorly configured network security devices, as well as the Nmap scripting engine, which allows for extensive customization. This course is the next step on your journey to understanding and effectively implementing Nmap, so it's recommended that you have some familiarization with the tool or watch the Getting Started course before beginning this one. While all the examples in this course are run from a Linux command line, the GUI version is available and can be used if that is your preference. In addition to Nmap familiarization, it is recommended that you have a basic understanding of IP version 4 addressing, ports, protocols, and variable length subnetting before taking this course. I really enjoyed creating this course, and I hope you enjoy watching it.