Scanning and Enumeration with NMAP
Offered By: Cybrary
Course Description
Overview
In Scanning and Enumeration with NMAP, Ken Underhill gives an overview of scanning and the scanning methodology, which is the process of collecting information on a network using technical tools. Ken Underhill uses an Nmap lab to demonstrate this process. Nmap is a powerful tool used by both attackers and defenders to scan networks.
Syllabus
- Scanning and Enumeration with NMAP
- Scanning and Enumeration
- NMAP Lab Part 1
- NMAP Lab Part 2
Taught by
Ken Underhill
Related Courses
An Introduction to Computer NetworksStanford University via Independent Computer Networks
University of Washington via Coursera Computer Networking
Georgia Institute of Technology via Udacity Cybersecurity and Its Ten Domains
University System of Georgia via Coursera Model Building and Validation
AT&T via Udacity