Delve into the world of network security with a practical approach to port scanning using Nmap and Kali Linux. The course begins by introducing you to the powerful toolset of Kali Linux and the fundamentals of Nmap, enabling you to understand and execute various network security operations. You will explore how to use Nmap for versioning, scanning, and working with complementary tools like Wireshark, setting the groundwork for more advanced techniques.
Getting Started in Port Scanning Using Nmap and Kali Linux
Instructor: Packt - Course Instructors
Included with
Recommended experience
What you'll learn
Identify the basic commands and functionalities of Nmap and Kali Linux
Execute various host discovery and port scanning techniques using Nmap
Assess the effectiveness of aggressive scanning techniques and versioning in network security
Develop secure network configurations and automation scripts using Ansible
Skills you'll gain
Details to know
Add to your LinkedIn profile
September 2024
3 assignments
See how employees at top companies are mastering in-demand skills
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
There are 4 modules in this course
In this module, we will explore the basics of Kali Linux and its applications in network security. We will delve into the functionalities of Nmap, from installation to performing advanced scans. Additionally, we will cover the integration and usage of Wireshark to complement network analysis and enhance security assessments.
What's included
5 videos
In this module, we will dive into the methods of host discovery using Nmap, starting with the default techniques. We will compare the functionalities available to standard users and root users, highlighting the advantages of each. We will also explore various host discovery options and learn how to generate and utilize host lists to streamline network reconnaissance.
What's included
6 videos1 assignment
In this module, we will cover the intricacies of performing scans using Nmap. We'll start by understanding the importance of port selection and move on to comparing and controlling different scan types. We will also discuss aggressive scanning techniques, version detection of software and operating systems, and how to audit SSH servers using Kali Linux to enhance network security.
What's included
7 videos
In this module, we will emphasize the significance of configuration management for system protection. We will guide you through the installation and testing of Ansible on Kali Linux, and demonstrate how to use ad-hoc commands and playbooks. Additionally, we'll cover configuring firewalls, understanding handlers and tasks, and securing SSH servers, all using Ansible to ensure robust system security.
What's included
7 videos1 reading2 assignments
Instructor
Offered by
Recommended if you're interested in Networking
Why people choose Coursera for their career
New to Networking? Start here.
Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy
Frequently asked questions
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.