Course Goals and Learning Objectives

For Nmap Questions and Answers use this forum HERE.

Goals for the whole course

Let's talk about the goals and learning objectives for this course after you've completed this course, you will be an expert in Nmap.

Nmap is a tool used by ethical hackers, penetration testers systems, administrators, and even black hat hackers, the network discovery and hacking.

You will be able to install Nmap on Windows, Mac and Linux from packages and source.

You'll be able to create a desktop or cloud hacking lab to do the practical Nmap exercises within the course you'll understand the basics of what port and network scanners are and what they're used for and why.

You'll master how to select targets to scan and how to interpret the port state shown in the results.

You'll know how to successfully discover active hosts on a network, how discovery works, what the best discovery options are.

You'll understand the many scan technique available within Nmap, including sin connect and act scans.

Plus all the others.

We explore the various methods to select ports that you wish to scan.

We cover in detail how to use all of Nmaps, detection, techniques, including service detection, version detection, and operating system detection.

You will understand how to use the powerful Nmap scripting engine NSE that comes with Nmap.

You'll learn how to invoke NSE scripts.

Plus I'll give you some tips on the best scripts to use and those to avoid you'll understand the format of scripts and how to go about learning, to write your own NSE scripts.

You'll understand how to optimize Nmap with timing and performance options.

You'll learn how Nmap can be configured to evade intrusion detection systems.

And bypass firewalls. We cover how to invoke the various output options.

So you can see the Nmap scan results in the format best suited for your needs.

You will learn how to convert, merge, and compare results.

We explore hacked perform scans using the Nmap GUI, zenmap and the options of available within zenmap.

You'll learn about the zenmap inbuilt profiles, which profile is suitable for what situation and how to use a profile editor to create commands within the GUI.

We explore how criminal black hat hackers use Nmap in the real world.

You'll understand how Nmap is used in combination with hacking infrastructure and command and control servers.

You'll learn how a criminal hacking infrastructure is used and where Nmap fits into the criminal hacking process.

Plus, I will show you several other extra hints and tips such as bash scripts and others to help you become an expert in Nmap.

So those are the goals and learning object is for this course, for this complete course on Nmap.

Complete and Continue  

Become a Member and Get Unlimited Access to 340+ Top Cyber Security Courses.