Discover top-class methods to identify weaknesses in services and systems to mitigate against network attacks
About This Video
- Learn how to tackle common network security threats with Kali Linux and Nmap
- Understand different port selection mechanisms of Nmap
- Understand Ansible configuration management and implement it in a real-world scenario
Kali Linux is one of the popular tools used for penetration testing, ethical hacking, and network security assessments. This course will help you to explore the techniques of port scanning using Nmap and Kali Linux.
The course starts by introducing you to the course objectives and to Kali Linux and Nmap. Next, you will delve into the concepts of host discovery, creating Nmap host lists in Kali Linux on the way. Moving ahead, you will learn the techniques used to perform scans with Nmap and learn the process of auditing Secure Shell (SSH) security to detect systems that allow password-based authentication. Toward the end, you will learn to use Ansible to secure the threats, ensuring that the fixes are documented are repeatable. Throughout this course, you will use Wireshark to analyze the network activity, which will help you to understand the different nodes of Nmap with ease.
By the end of this course, you will have gained all the essential skills needed to perform cybersecurity audits of your network using Kali Linux and Nmap.
Table of contents
- Title: Getting Started in Port Scanning Using Nmap and Kali Linux
- Release date: November 2020
- Publisher(s): Packt Publishing
- ISBN: 9781801078696
You might also like
51+ hours of video instruction. Overview The professional programmer’s Deitel® video guide to Python development with …
Linux Basics for Hackers
If you’re getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for …
Hands-On Machine Learning with Scikit-Learn, Keras, and TensorFlow, 2nd Edition
Through a series of recent breakthroughs, deep learning has boosted the entire field of machine learning. …
Test Driven Development: By Example
Clean code that works--now. This is the seeming contradiction that lies behind much of the pain …