Getting Started with Nmap

Getting Started with Nmap

English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 1h 26m | 200 MB

Testing network security controls and discovering vulnerabilities are important parts of any organizations security plan. This course will help you learn how to use Nmap to discover network hosts and potential vulnerabilities.

Nmap, or network mapper, is a tool that has been around for more than 20 years. In this course, Getting Started with Nmap, you will learn how this versatile tool can be broken down into phases that are easily understood and implemented. First, you will go over Nmap installation and command structure. Next, you will move progressively through each scan phase until you are leveraging more advanced features. Finally, you will have the opportunity to apply what you learn to a scenario where you use Nmap to evaluate network devices. By the end of the course, you will have a basic understanding of how to use Nmap for internal security testing and will be running your own commands to detect applications running on your devices.

Table of Contents

Course Overview
1 Course Overview

Navigating Nmap and Its Capabilities
2 Overview
3 Demo – Installing Nmap
4 Demo – Lab Setup
5 Summary

Understanding Nmap Basic Functions
6 Overview
7 Nmap Scan Phases
8 Nmap Command Structure
9 Demo – Nmap from the Command Line
10 Demo – Zenmap GUI
11 Summary

Host Enumeration and Network Mapping
12 Overview
13 Nmap Host Discovery Controls
14 Demo – Discovering Hosts at Wired Brain Coffee
15 Specific Target Hosts and Networks
16 Demo – Scanning Specific IP Ranges
17 Defenses Against Nmap Host Discovery
18 Summary

Port Scanning with Nmap
19 Overview
20 Port Scanning for Internal Security Testing
21 Port Scanning Basics with Nmap
22 Demo – Port Scanning at Wired Brain Coffee
23 Protecting Against Port Scanning
24 Summary

Performance and Timing
25 Overview
26 Reducing Scan Time
27 Demo – Decreasing Scan Time
28 Strategies for Optimizing Scans
29 Summary

Understanding Service Application Version and OS Detection
30 Overview
31 Detecting Service and Application Versions
32 Demo – Version Detection
33 Operating System Detection
34 Demo – Operating System Detection
35 Vulnerability Remediation
36 Summary

Detecting and Scanning Firewalls
37 Overview
38 Finding and Scanning Firewalls with Nmap
39 Demo – Detecting and Scanning Firewalls
40 Remediating Discovered Vulnerabilities
41 Summary

Wrapping Up
42 Nmap Moving Forward