Video description
Audit and analyze your network security with Nmap
About This Video
- Understand the power of Nmap to discover vulnerabilities, emulate intruder attacks, and secure internal resources
- Your preparation guide to performing internal network security audits
- Utilize Zenmap to perform Nmap scanning and use the Nmap scripting engine to automate tasks
In Detail
Do you want to enhance your organization’s network security? Are you worried about what could happen if an intruder were to move laterally throughout your network? Internal network security testing is a critical aspect of any security program, while not knowing if an attacker has successfully identified a flaw that has led to a breach could be disastrous.
In this course, you will learn about several modules to use Nmap in real life situations, discovering vulnerabilities, and emulate an attack on a system. You will start with a review of penetration testing processes, installing Nmap, types of available scans, and the reasons for selecting different Nmap scanning options. Next, you will learn about advanced scanning with Nmap and customize scans to analyze machines, servers, and networking devices. You will then create Nmap reports and customize formatting options for detailed information about the network. You will automate useful activities using the Nmap scripting engine.You will also learn about Firewall and IDS evasion and Zenmap GUI.
By the end of this course, you will be able to confidently audit your network with Nmap and scan through vulnerabilities to secure your network.
<>Audience
This course is for ethical hackers, penetration testers, system administrators, and IT security professionals who want to secure their network and its hosts.
Requirement:
No knowledge about Nmap is assumed.
Participants should have a basic understanding of virtualization technologies, networking concepts and penetration testing methodologies before attending this course.
Product information
- Title: Hands-On Network Scanning with Nmap for Network Security
- Author(s):
- Release date: March 2020
- Publisher(s): Packt Publishing
- ISBN: 9781838981853
You might also like
book
Learn Kali Linux 2019
Explore the latest ethical hacking tools and techniques in Kali Linux 2019 to perform penetration testing …
book
Cybersecurity Blue Team Toolkit
A practical handbook to cybersecurity for both tech and non-tech professionals As reports of major data …
video
The Complete Cybersecurity Bootcamp (Video Collection): Threat Defense, Ethical Hacking, and Incident Handling
More than 25 Hours of Expert Video Instruction This course is a complete guide to help …
book
Linux Basics for Hackers
If you’re getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for …