Testing Security Controls and Detecting Vulnerabilities with Nmap
Offered By: Pluralsight
Course Description
Overview
Learn how to leverage the capabilities of Nmap to find insecure applications and explore the weaknesses in your organization’s firewalls.
Testing network security controls and discovering vulnerabilities are important parts of any organizations security plan. In this course, Testing Security Controls and Detecting Vulnerabilities with Nmap 7, you will learn how to do just that. First, you will learn how Nmap conducts host discovery. Next, you will see how to perform port scans. Finally, you will learn how Nmap detects applications and operating systems. After finishing this course, you will know how to leverage the capabilities of Nmap to find insecure applications and explore the weaknesses in your organization’s network security devices.
Testing network security controls and discovering vulnerabilities are important parts of any organizations security plan. In this course, Testing Security Controls and Detecting Vulnerabilities with Nmap 7, you will learn how to do just that. First, you will learn how Nmap conducts host discovery. Next, you will see how to perform port scans. Finally, you will learn how Nmap detects applications and operating systems. After finishing this course, you will know how to leverage the capabilities of Nmap to find insecure applications and explore the weaknesses in your organization’s network security devices.
Syllabus
- Course Overview 2mins
- Using Nmap for Security Testing 5mins
- Host Enumeration and Network Mapping 20mins
- Detecting Vulnerabilities with Nmap Port Scanning 28mins
- Leveraging Service and Application Version Detection 9mins
- Using OS Detection for Security Testing 9mins
- Detecting and Evading Firewalls and Intrusion Detection Systems 11mins
- Understanding the Nmap Scripting Engine (NSE) 9mins
- Wrapping Up 2mins
Taught by
Matt Glass
Related Courses
An Introduction to Computer NetworksStanford University via Independent Computer Networks
University of Washington via Coursera Computer Networking
Georgia Institute of Technology via Udacity Cybersecurity and Its Ten Domains
University System of Georgia via Coursera Model Building and Validation
AT&T via Udacity