YoVDO

Scanning and Enumeration with NMAP

Offered By: Cybrary

Tags

Nmap Courses Network Security Courses

Course Description

Overview

In Scanning and Enumeration with NMAP, Ken Underhill gives an overview of scanning and the scanning methodology, which is the process of collecting information on a network using technical tools. Ken Underhill uses an Nmap lab to demonstrate this process. Nmap is a powerful tool used by both attackers and defenders to scan networks.


Syllabus

  • Scanning and Enumeration with NMAP
    • Scanning and Enumeration
    • NMAP Lab Part 1
    • NMAP Lab Part 2

Taught by

Ken Underhill

Related Courses

An Introduction to Computer Networks
Stanford University via Independent
Computer Networks
University of Washington via Coursera
Computer Networking
Georgia Institute of Technology via Udacity
Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Model Building and Validation
AT&T via Udacity