YoVDO

Scanning and Enumeration with NMAP

Offered By: Cybrary

Tags

Nmap Courses Network Security Courses

Course Description

Overview

In Scanning and Enumeration with NMAP, Ken Underhill gives an overview of scanning and the scanning methodology, which is the process of collecting information on a network using technical tools. Ken Underhill uses an Nmap lab to demonstrate this process. Nmap is a powerful tool used by both attackers and defenders to scan networks.


Syllabus

  • Scanning and Enumeration with NMAP
    • Scanning and Enumeration
    • NMAP Lab Part 1
    • NMAP Lab Part 2

Taught by

Ken Underhill

Related Courses

The Complete Penetration Testing Bootcamp
Udemy
Don's Introduction to Ethical Hacking for Beginners
Udemy
Practice Your First Penetration Test: Kali & Metasploit Lab
Udemy
The Definitive Ethical Hacking Course - Learn From Scratch
Udemy
Kali Linux Hacking Lab for Beginners
Udemy