Book Image

Hands-On Network Scanning with Nmap for Network Security [Video]

By : Brian Rogalski
5 (1)
Book Image

Hands-On Network Scanning with Nmap for Network Security [Video]

5 (1)
By: Brian Rogalski

Overview of this book

Do you want to enhance your organization’s network security? Are you worried about what could happen if an intruder were to move laterally throughout your network? Internal network security testing is a critical aspect of any security program, while not knowing if an attacker has successfully identified a flaw that has led to a breach could be disastrous. In this course, you will learn about several modules to use Nmap in real life situations, discovering vulnerabilities, and emulate an attack on a system. You will start with a review of penetration testing processes, installing Nmap, types of available scans, and the reasons for selecting different Nmap scanning options. Next, you will learn about advanced scanning with Nmap and customize scans to analyze machines, servers, and networking devices. You will then create Nmap reports and customize formatting options for detailed information about the network. You will automate useful activities using the Nmap scripting engine.You will also learn about Firewall and IDS evasion and Zenmap GUI. By the end of this course, you will be able to confidently audit your network with Nmap and scan through vulnerabilities to secure your network.
Table of Contents (5 chapters)
Chapter 2
Nmap Discovery and Basic Scanning
Content Locked
Section 3
Port Scanning
In this video, we will learn about ports, their states, and how to perform port scanning with Nmap.