Video description
Do you want to enhance your organization’s network security? Are you worried about what could happen if an intruder were to move laterally throughout your network? Internal network security testing is a critical aspect of any security program, while not knowing if an attacker has successfully identified a flaw that has led to a breach could be disastrous.
In this course, you will learn about several modules to use Nmap in real life situations, discovering vulnerabilities, and emulate an attack on a system. You will start with a review of penetration testing processes, installing Nmap, types of available scans, and the reasons for selecting different Nmap scanning options. Next, you will learn about advanced scanning with Nmap and customize scans to analyze machines, servers, and networking devices. You will then create Nmap reports and customize formatting options for detailed information about the network. You will automate useful activities using the Nmap scripting engine.You will also learn about Firewall and IDS evasion and Zenmap GUI.
By the end of this course, you will be able to confidently audit your network with Nmap and scan through vulnerabilities to secure your network.
What You Will Learn
- Learn how to perform internal network scans to audit and secure your network
- Understand how to use Nmap to perform network scanning with basic and advanced options
- Get familiar with host discovery and advanced Nmap scanning options to emulate attacks
- Create custom reports and inventories facilitated by Nmap scanning
- Automate features and tasks of Nmap using the scripting engine
- Get familiar with firewall and intrusion detection system (IDS) evasion techniques and Zenmap
Audience
This course is for ethical hackers, penetration testers, system administrators, and IT security professionals who want to secure their network and its hosts.
Requirement:
No knowledge about Nmap is assumed.
Participants should have a basic understanding of virtualization technologies, networking concepts and penetration testing methodologies before attending this course.
About The Author
Brian Rogalski: Brian Rogalski is a technically sophisticated computer professional with “hands-on” information security and networking expertise. Brian is known for his ability to implement advanced technology and provide solutions to individuals and businesses alike to meet a diversity of needs. Brian is also known for his analysis and communication skills. Brian is a security professional working in information technology for over 15 years.
Product information
- Title: Hands-On Network Scanning with Nmap for Network Security
- Author(s):
- Release date: March 2020
- Publisher(s): Packt Publishing
- ISBN: 9781838981853
You might also like
book
Nmap Network Exploration and Security Auditing Cookbook - Third Edition
A complete reference guide to mastering Nmap and its scripting engine, covering practical tasks for IT …
book
Network Security, Firewalls, and VPNs, 3rd Edition
Network Security, Firewalls, and VPNs, third Edition provides a unique, in-depth look at the major business …
video
CCNP and CCIE Security Core SCOR 350-701
12+ Hours of Video Instruction More than 12 hours of video instruction and remediation organized to …
video
Network Analysis Using Wireshark 3
Wireshark is an open-source network protocol analyzer. It is the world's leading packet analyzer when it …