Featured resource
Tech Upskilling Playbook 2025
Tech Upskilling Playbook

Build future-ready tech teams and hit key business milestones with seven proven plays from industry leaders.

Learn more
  • Path icon Learning Path
  • Libraries: This path is only available in the libraries listed. To access this path, purchase a license for the corresponding library.
  • Security

Information Security Testing and Auditing with Nmap

4 Courses
5 Hours
Skill IQ

Testing network security controls and discovering vulnerabilities are important parts of any organizations security plan. Nmap ("Network Mapper") is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X.

Content in this path

Information Security Testing and Auditing with Nmap

In this section, you will learn about Nmap's use cases and functions. You'll learn how to run a host discovery scan, port scan, and operating system scan. You will learn how to detect and evade firewalls and intrusion detection systems (IDS). You'll also learn to identify and exploit vulnerabilities.

Try this learning path for free
Access this learning path and other top-rated tech content with a free trial.
Have questions? Get them answered now.
What You'll Learn
  • Scan types, targets, and outcomes
  • Network service and application version detection
  • Detect vulnerabilities and test security controls
  • Detect and evade firewalls and intrusion detection systems (IDS)
  • Customize Nmap scripts to detect a specific vulnerability
  • Interpret the results of the scan(s)
Prerequisites
  • Security Fundamentals
Related topics
  • Penetration Testing
  • Ethical Hacking
  • Vulnerability Management
  • Vulnerability Analysis
  • Vulnerability Assessment
  • Enumeration
Not sure where to start?
With over 500 assessments to choose from, you can see where your skills stand and receive adaptive learning recommendations to fill knowledge gaps in as little as 10 minutes.
Learn more

Join our learners and upskill
in leading technologies