Complete Nmap Ethical Hacking Training for Network Security

Complete Nmap Ethical Hacking Training for Network Security

English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 3 Hours | 316 MB

Discover networks, find open ports, check devices with vulnerabilities by using Nmap.Gateway to Ethical Hacking training

Welcome to the “Complete Nmap Ethical Hacking Training for Network Security” course. This is our 3rd course in our Ethical Hacking series.

To be able to perform a successful penetration testing or ethical hacking, first, you have to know all the secrets of your targets. You should find all the systems and network devices of your target network before proceeding an ethical hacking operation.

On my complete course, you`ll discover the secrets of ethical hacking and network discovery, using Nmap. You’ll learn all the details of Nmap, which is the most known and de facto network scanning tool. After downloading and installing Nmap by hands on lessons, you will be able to use it as an ip port scanner, open port tester and checking for devices’ operating system and other features.

Then in further lessons, we’ll scan the vulnerabilities of the network we discovered by using Nessus. Nessus is the most known vulnerability scanner and is in the third place of the most popular cyber security tools.

This course starts at beginner levels so you don’t need to have a previous knowledge of network scanning, finding vulnerabilities in devices, using Nmap & using Nessus.

In this course I tried to show the importance of using free tools and platforms, so you don’t need to buy any tool or application.

A step by step approach will help you to track your progress on the go and learn needed skills gradually at your own pace. At the end of this course, you will both have a knowledge and a practical skill set about using network scanning, finding vulnerabilities on systems and learning the general competencies of hackers.

Here’s just some of what you’ll learn by the end of course,

  • Understand the main terminology of Network Scanning and Finding Vulnerabilities in devices in a network
  • Using Nmap with full knowledge and experience
  • How to scan a network for scripts
  • Learn about network scan types
  • Learn how to use Hping

What Will I Learn?

  • Learn how to use Nmap
  • Learn how to use Nessus
  • Learn about network scan types
  • Learn about script scanning
Table of Contents

Introduction
1 Introduction

Scan Types
2 Passive Scan – Definition
3 Passive Scan – Wireshark
4 Passive Scan – ARP Tables
5 Active Scan

Nmap Introduction Basics
6 Nmap Introduction
7 TCPIP Basics – Layers and Protocols
8 TCPIP Basics – An Example DNS Query
9 TCPUDP Basics

Nmap in Action – 1 Scan Types
10 Ping Scan
11 SYN Scan
12 Port Scan
13 TCP Scan
14 UDP Scan

Nmap in Action – 2 Detection Management
15 Version Detection
16 Operating System Detection
17 Input-Output Management
18 Lab Exercise – 1

Nmap in Action – 3 Script Scanning
19 Introduction
20 First Script Example
21 Second Script Example
22 Third Script Example

Nmap in Action – 4 Timing and IPSIVS Evasion
23 Bypassing IPSIDS Devices
24 Timing

Nmap in Action – 5 Some Other Scans
25 NULL FIN XMAS and ACK Scan
26 Idle Scan

Vulnerability Scan and Introduction to Nessus
27 Introduction to Vulnerability Scan
28 Introduction to Nessus
29 Downloading Nessus
30 Installing Nessus

Nessus in Action
31 Creating Policy
32 Scanning
33 Reporting
34 Lab Exercise – 2