• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Nmap Techniques

Results for "nmap+techniques"


  • P

    Packt

    Getting Started in Port Scanning Using Nmap and Kali Linux

    Skills you'll gain: Vulnerability Scanning, Network Security, Penetration Testing, Configuration Management, System Configuration, Firewall, Linux Commands, Servers, Command-Line Interface, TCP/IP, Network Analysis, Software Versioning

    Intermediate · Course · 1 - 4 Weeks

  • P

    Packt

    Cisco CyberOps Associate (200-201)

    Skills you'll gain: Cyber Operations, Intrusion Detection and Prevention, Cybersecurity, Security Controls, Cyber Attacks, Incident Response, Digital Forensics, Risk Management Framework, Exploitation techniques, Network Security, Threat Management, Computer Security Incident Management, Network Monitoring, Event Monitoring, Network Analysis, Firewall, Data Integrity

    5
    Rating, 5 out of 5 stars
    ·
    22 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    E

    EDUCBA

    Advanced Penetration Testing with Kali Linux

    Skills you'll gain: Penetration Testing, Vulnerability Scanning, Vulnerability Assessments, Cyber Security Assessment, Exploitation techniques, Malware Protection, Security Testing, Mobile Security, Test Script Development, Scripting, Android (Operating System), Human Factors (Security), Scripting Languages, Authentications, Network Analysis, Automation, Virtual Networking, Virtual Environment

    4.8
    Rating, 4.8 out of 5 stars
    ·
    13 reviews

    Mixed · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    E

    EDUCBA

    Ethical Hacking with Kali Linux: Learn & Secure

    Skills you'll gain: Penetration Testing, Vulnerability Scanning, Hardening, Cybersecurity, Security Testing, Vulnerability Assessments, Network Analysis, Exploitation techniques, Linux, System Configuration, Linux Administration, Virtual Machines, Linux Commands, Operating Systems, Software Installation

    4.9
    Rating, 4.9 out of 5 stars
    ·
    30 reviews

    Mixed · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    Edureka

    Cybersecurity and Network Defense Fundamentals

    Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Hardening, Cyber Threat Hunting, Operating System Administration, Threat Modeling, Exploitation techniques, Linux Commands, Intrusion Detection and Prevention, Cyber Operations, Linux, Cybersecurity, Cyber Security Strategy, Network Security, Network Monitoring, Operating Systems, Cyber Attacks, Cyber Engineering, Network Administration, Security Awareness

    Beginner · Course · 1 - 4 Weeks

  • Status: Preview
    Preview
    I

    Infosec

    Network Traffic Analysis for Incident Response

    Skills you'll gain: Event Monitoring, OSI Models, Network Monitoring, Network Protocols, Cyber Threat Intelligence, Network Analysis, TCP/IP, Distributed Denial-Of-Service (DDoS) Attacks, Threat Detection, General Networking, Network Security, Incident Response, Anomaly Detection, Command-Line Interface

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    I

    IBM

    Exploitation and Penetration Testing with Metasploit

    Skills you'll gain: Penetration Testing, Exploit development, Network Security, Vulnerability, Cybersecurity, Vulnerability Assessments, Human Factors (Security), Information Systems Security, Data Persistence

    4.3
    Rating, 4.3 out of 5 stars
    ·
    32 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    I

    Illinois Tech

    Introduction to Data Networks and the Internet - Master's

    Skills you'll gain: Network Security, Network Troubleshooting, Software-Defined Networking, Network Engineering, Network Monitoring, Virtual Networking, TCP/IP, Network Architecture, Computer Networking, Network Performance Management, Network Protocols, General Networking, Cybersecurity, Network Infrastructure, Network Administration, Local Area Networks, Network Analysis, OSI Models, Network Model, Network Routing

    Build toward a degree

    4.6
    Rating, 4.6 out of 5 stars
    ·
    11 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    E

    EDUCBA

    Ethical Hacking with Kali Linux: Analyze & Defend

    Skills you'll gain: Penetration Testing, Malware Protection, Cyber Security Assessment, Cyber Threat Intelligence, Exploitation techniques, Cybersecurity, Intrusion Detection and Prevention, Email Security, Vulnerability Assessments, Network Security, Human Factors (Security), Network Analysis, Data Persistence

    5
    Rating, 5 out of 5 stars
    ·
    15 reviews

    Mixed · Course · 1 - 4 Weeks

  • C

    Coursera

    Vulnerability Scanning with Nmap: Network Scanning

    Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Penetration Testing, Security Testing, Network Security, Threat Detection, Network Monitoring, Network Analysis, Operating Systems

    4.5
    Rating, 4.5 out of 5 stars
    ·
    81 reviews

    Beginner · Guided Project · Less Than 2 Hours

  • Status: Free Trial
    Free Trial
    C

    Cisco Learning and Certifications

    Data Security

    Skills you'll gain: Key Management, Data Security, Cryptography, Encryption, Cybersecurity, Network Security, Cryptographic Protocols, Security Information and Event Management (SIEM), Network Monitoring, Information Assurance, Network Analysis, Intrusion Detection and Prevention, Security Controls, Event Monitoring, Continuous Monitoring, Threat Detection, Data Integrity

    4.8
    Rating, 4.8 out of 5 stars
    ·
    63 reviews

    Mixed · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    Edureka

    Incident Response and Threat Mitigation

    Skills you'll gain: Incident Response, Cyber Threat Intelligence, Computer Security Incident Management, Incident Management, Endpoint Detection and Response, Threat Detection, Threat Management, Cybersecurity, Security Information and Event Management (SIEM), Cyber Attacks, Cyber Security Assessment, Security Management, Disaster Recovery, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Engineering, Digital Forensics, Security Testing, Cyber Governance, Network Security, Linux

    Intermediate · Course · 1 - 4 Weeks

1234…9

In summary, here are 10 of our most popular nmap+techniques courses

  • Getting Started in Port Scanning Using Nmap and Kali Linux: Packt
  • Cisco CyberOps Associate (200-201): Packt
  • Advanced Penetration Testing with Kali Linux: EDUCBA
  • Ethical Hacking with Kali Linux: Learn & Secure: EDUCBA
  • Cybersecurity and Network Defense Fundamentals: Edureka
  • Network Traffic Analysis for Incident Response: Infosec
  • Exploitation and Penetration Testing with Metasploit: IBM
  • Introduction to Data Networks and the Internet - Master's: Illinois Tech
  • Ethical Hacking with Kali Linux: Analyze & Defend: EDUCBA
  • Vulnerability Scanning with Nmap: Network Scanning: Coursera

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok