Delve into the world of network security with a practical approach to port scanning using Nmap and Kali Linux. The course begins by introducing you to the powerful toolset of Kali Linux and the fundamentals of Nmap, enabling you to understand and execute various network security operations. You will explore how to use Nmap for versioning, scanning, and working with complementary tools like Wireshark, setting the groundwork for more advanced techniques.
Getting Started in Port Scanning Using Nmap and Kali Linux
Instructor: Packt - Course Instructors
Sponsored by Louisiana Workforce Commission
Recommended experience
What you'll learn
Identify the basic commands and functionalities of Nmap and Kali Linux
Execute various host discovery and port scanning techniques using Nmap
Assess the effectiveness of aggressive scanning techniques and versioning in network security
Develop secure network configurations and automation scripts using Ansible
Details to know
Add to your LinkedIn profile
3 assignments
September 2024
See how employees at top companies are mastering in-demand skills
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
There are 4 modules in this course
In this module, we will explore the basics of Kali Linux and its applications in network security. We will delve into the functionalities of Nmap, from installation to performing advanced scans. Additionally, we will cover the integration and usage of Wireshark to complement network analysis and enhance security assessments.
What's included
5 videos
In this module, we will dive into the methods of host discovery using Nmap, starting with the default techniques. We will compare the functionalities available to standard users and root users, highlighting the advantages of each. We will also explore various host discovery options and learn how to generate and utilize host lists to streamline network reconnaissance.
What's included
6 videos1 assignment
In this module, we will cover the intricacies of performing scans using Nmap. We'll start by understanding the importance of port selection and move on to comparing and controlling different scan types. We will also discuss aggressive scanning techniques, version detection of software and operating systems, and how to audit SSH servers using Kali Linux to enhance network security.
What's included
7 videos
In this module, we will emphasize the significance of configuration management for system protection. We will guide you through the installation and testing of Ansible on Kali Linux, and demonstrate how to use ad-hoc commands and playbooks. Additionally, we'll cover configuring firewalls, understanding handlers and tasks, and securing SSH servers, all using Ansible to ensure robust system security.
What's included
7 videos1 reading2 assignments
Instructor
Offered by
Why people choose Coursera for their career
Recommended if you're interested in Information Technology
Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy