Featured resource
2025 Tech Upskilling Playbook
Tech Upskilling Playbook

Build future-ready tech teams and hit key business milestones with seven proven plays from industry leaders.

Check it out
  • Learning Path
  • Libraries: This path is only available in the libraries listed. To access this path, purchase a license for the corresponding library.
  • Security

Information Security Testing and Auditing with Nmap

4 Courses
5 Hours
Skill IQ

Testing network security controls and discovering vulnerabilities are important parts of any organizations security plan. Nmap ("Network Mapper") is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X.

Content in this path
Information Security Testing and Auditing with Nmap

In this section, you will learn about Nmap's use cases and functions. You'll learn how to run a host discovery scan, port scan, and operating system scan. You will learn how to detect and evade firewalls and intrusion detection systems (IDS). You'll also learn to identify and exploit vulnerabilities.

Try this learning path for free
Access this learning path and other top-rated tech content with a free trial.
What You'll Learn
  • Scan types, targets, and outcomes
  • Network service and application version detection
  • Detect vulnerabilities and test security controls
  • Detect and evade firewalls and intrusion detection systems (IDS)
  • Customize Nmap scripts to detect a specific vulnerability
  • Interpret the results of the scan(s)
Prerequisites
  • Security Fundamentals
Related topics
  • Penetration Testing
  • Ethical Hacking
  • Vulnerability Management
  • Vulnerability Analysis
  • Vulnerability Assessment
  • Enumeration
Not sure where to start?
With over 500 assessments to choose from, you can see where your skills stand and receive adaptive learning recommendations to fill knowledge gaps in as little as 10 minutes.

Get started with Pluralsight