In this comprehensive course, you will embark on a journey through the fundamentals and advanced techniques of Nmap, a critical tool for network scanning and penetration testing. Starting with an introduction and the setup of your working environment, you'll quickly move into compiling Nmap from source and understanding its significance in network scanning. This course is meticulously updated for 2021, ensuring you are equipped with the latest knowledge and techniques.
Neues Jahr. Große Ziele. Höhere Einsparungen. Schalte mit Coursera Plus für $199 ein Jahr unbegrenzten Zugang zum Lernen frei. Jetzt sparen.
Nmap for Penetration Testing: From Beginner to Advanced
Dozent: Packt - Course Instructors
Bei enthalten
Empfohlene Erfahrung
Was Sie lernen werden
Define key terms related to Nmap and network scanning
Explain the purpose and functionality of various Nmap commands and options
Conduct basic and advanced network scans using Nmap in real-world scenarios.
Interpret scan results to identify network vulnerabilities and potential security threats
Kompetenzen, die Sie erwerben
- Kategorie: penetration testing
- Kategorie: Nmap
- Kategorie: cybersecurity
- Kategorie: Network Security
- Kategorie: firewall evasion
Wichtige Details
Zu Ihrem LinkedIn-Profil hinzufügen
Oktober 2024
4 Aufgaben
Erfahren Sie, wie Mitarbeiter führender Unternehmen gefragte Kompetenzen erwerben.
Erwerben Sie ein Karrierezertifikat.
Fügen Sie diese Qualifikation zur Ihrem LinkedIn-Profil oder Ihrem Lebenslauf hinzu.
Teilen Sie es in den sozialen Medien und in Ihrer Leistungsbeurteilung.
In diesem Kurs gibt es 8 Module
In this module, we will explore the foundational aspects of Nmap, starting with an introduction to its capabilities and features. We will then guide you through setting up your working environment, compiling Nmap from source, and discussing its critical role in network scanning. This section sets the stage for a comprehensive understanding of Nmap and its applications.
Das ist alles enthalten
4 Videos1 Lektüre
In this module, we will delve into the core concepts of networking that are essential for effective network scanning and security. We will begin with an overview of port scanning techniques, followed by an in-depth look at the OSI Model. You'll gain a solid understanding of the Network and Transport Layers, and we will conclude with a detailed analysis of TCP header flags and the TCP 3-way handshake, critical for ensuring reliable data communication.
Das ist alles enthalten
5 Videos
In this module, we will explore a range of host discovery techniques crucial for network reconnaissance. Starting with ping sweeps, we will cover various methods including TCP SYN and ACK pings, UDP ping scans, and ARP ping. We will also delve into the use of ICMP ECHO and Timestamp pings, IP Protocol pings, and conclude with an in-depth look at traceroute and reverse DNS resolution. This section provides the tools needed to effectively discover and map hosts within a network
Das ist alles enthalten
8 Videos1 Aufgabe
In this module, we will dive into advanced scanning techniques using Nmap. You'll learn to set up a virtual hacking lab and deploy Metasploitable3 VM images for hands-on practice. We'll cover a variety of scan types, including default scans, TCP Connect, SYN, and UDP scans, as well as more sophisticated techniques like OS detection, service detection, and aggressive scanning. Additionally, you'll explore options for verbosity, output, logging, and visualizing scan results with WebMap. This section equips you with the skills to conduct thorough and efficient network scans.
Das ist alles enthalten
14 Videos
In this module, we will cover the techniques for detecting and evading firewalls during network scanning activities. You will learn how to use ACK probing to identify firewall presence, employ packet fragmentation to circumvent security barriers, and specify MTU settings to fine-tune your evasion methods. Additionally, we will explore the use of IP decoys to mask scanning origins and MAC address spoofing to conceal the identity of your devices. This section equips you with advanced strategies to navigate and bypass network defenses.In this module, we will cover the techniques for detecting and evading firewalls during network scanning activities. You will learn how to use ACK probing to identify firewall presence, employ packet fragmentation to circumvent security barriers, and specify MTU settings to fine-tune your evasion methods. Additionally, we will explore the use of IP decoys to mask scanning origins and MAC address spoofing to conceal the identity of your devices. This section equips you with advanced strategies to navigate and bypass network defenses.
Das ist alles enthalten
5 Videos
In this module, we will focus on enhancing the timing and performance of your scans using Nmap. You'll learn how to apply timing templates to streamline scan operations, utilize parallelism to execute multiple scans concurrently, and configure host timeout settings to control scan durations. Additionally, we will explore adjusting scan delay to ensure efficient scanning without overloading the network. This section provides the tools to maximize the effectiveness and efficiency of your scanning activities
Das ist alles enthalten
4 Videos1 Aufgabe
In this module, we will introduce you to the Nmap Scripting Engine (NSE) and its powerful capabilities for network scanning and automation. You'll learn the syntax and structure of NSE scripts, making it easier to understand and modify them. We'll explore the different script categories and their specific uses, enabling you to select the right scripts for your tasks. Additionally, you'll gain the skills to develop custom NSE scripts, enhancing Nmap's functionality to suit your unique requirements. This section equips you with the knowledge to leverage NSE for advanced scanning and automation.
Das ist alles enthalten
3 Videos
In this module, we will dive into service enumeration techniques to extract detailed information about network services. You'll learn to perform banner grabbing, utilize Whois and traceroute for network enumeration, and conduct FTP and SMTP enumeration. We will explore DNS enumeration techniques, including zone transfers and brute-forcing, and delve into HTTP enumeration for identifying methods, hidden files, and WAFs. Additionally, we'll cover SMB and MySQL enumeration, and conclude with vulnerability scanning using Nmap. This section equips you with the skills to thoroughly investigate and analyze network services for security assessments
Das ist alles enthalten
11 Videos2 Aufgaben
Dozent
von
Empfohlen, wenn Sie sich für Security interessieren
Johns Hopkins University
Akamai Technologies, Inc.
Microsoft
Warum entscheiden sich Menschen für Coursera für ihre Karriere?
Neue Karrieremöglichkeiten mit Coursera Plus
Unbegrenzter Zugang zu 10,000+ Weltklasse-Kursen, praktischen Projekten und berufsqualifizierenden Zertifikatsprogrammen - alles in Ihrem Abonnement enthalten
Bringen Sie Ihre Karriere mit einem Online-Abschluss voran.
Erwerben Sie einen Abschluss von erstklassigen Universitäten – 100 % online
Schließen Sie sich mehr als 3.400 Unternehmen in aller Welt an, die sich für Coursera for Business entschieden haben.
Schulen Sie Ihre Mitarbeiter*innen, um sich in der digitalen Wirtschaft zu behaupten.
Häufig gestellte Fragen
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.