The Complete Nmap Ethical Hacking Course : Network Security Assessment

Become an expert in the ethical hacking and network security tool Nmap!

Welcome to the Complete Nmap Course!

Nmap is the Internets most popular network scanner with advanced features that most people don't even know exists!

Discover the secrets of ethical hacking and network discovery, using Nmap on this complete course.

Nmap is an indispensable tool that all techies should know well. It is used by all good ethical hackers, penetration testers, systems administrators, and anyone in fact who wants to discovery more about the security of a network and its hosts.

You cannot be a good ethical hacker or systems administrator without being an expert in Nmap.

You will go from beginner to expert in easy to follow structured steps - and we cover all major platforms that Nmap can be used on, including - Windows, Mac, Linux and Kali.

The ideal student for this course is technically minded with an interest in ethical hacking and network security.

At the end of this course you'll have a practical skill-set in using Nmap to scan networks. You will be able to find vulnerabilities and weaknesses on systems that can be exploited by hackers.


Over 4 hours of on-demand video!

What Will I Learn?

You will become an expert in using Nmap for ethical hacking, system administration and network security.

Learn how to successfully discover active and vulnerable hosts on a network.

You will explore Nmap Installation, Hacking Labs, Network and port scanner basics, Target selection, Port states, Host discovery, Scan techniques and Port selection.

You will master Service detection, Version detection, Operating system detection, and optimizing Timing and performance.

You will explore the Nmap Scripting Engine (NSE) used for more advanced discovery and hacking. We look at many scripts including those used for brute forcing passwords in email and databases, cross-site scripting (XSS) and SQL injection (SQLi) discovery and other cool Nmap scripts.

Learn Firewall and Intrusion detection evasion, Nmap output (convert, merge and compare) results, Zenmap (Nmap GUI) and how criminal black hat hackers use Nmap.

Scan to determine firewall rules while avoiding intrusion detection systems (IDS).

You will understand how Nmap is used in combination with criminal hacking infrastructures (command and control) servers.

Importantly we cover the both the command line version of Nmap and the GUI version of Nmap called Zenmap.

Plus I include some great extra bonuses, like useful bash scripts to use with Nmap and an amazing cheat sheet to easily remember complex commands.

Plus much more.

Prerequisite Course Requirements

  • A basic understanding of using operating systems, networks, TCP/IP and the Internet. A willingness to learn.

Your Instructor

Nathan House
Nathan House

I have over 24 years experience in cyber security where I have advised some of largest companies in the world, assuring security on multi-million and multi-billion pound projects. I am the CEO of Station X a cyber security consultancy. More recently I acted as the lead security consultant on a number of the UKs mobile banking and payment solutions helping secure to date over £71Bn in transactions.

My clients have included; BP, ExxonMobil, Shell, Vodafone, VISA, T-mobile, GSK, COOP Banking Group, Royal Bank of Scotland, Natwest, Yorkshire bank, BG Group, BT, London 2012.

Over the years I have spoken at a number of security conferences, developed free security tools, and discovered serious security vulnerabilities in leading applications.

Qualifications and education

★ BSc. (Hons) Computing 'Networks & Communication' 1st Class Honors
★ SCF : SABSA Chartered Architect Foundation
★ CISSP : Certified Information Systems Security Professional
★ CISA : Certified Information Systems Auditor
★ CISM : Certified Information Security Manager
★ ISO 27001 Certified ISMS Lead Auditor
★ CEH : Certified Ethical Hacker
★ OSCP : Offensive Security Certified Professional

Course Curriculum

  Nmap Cheat Sheet
Available in days
days after you enroll
  How Criminal Black Hats Use Nmap with Hacking Infrastructures
Available in days
days after you enroll
  Wrap up
Available in days
days after you enroll


Upon completion of the course, you'll get the opportunity to earn a Certificate of Completion.

Learn More!


Who is your target audience?

- Those interested in Nmap

- Technically minded people

- Ethical hackers

- Penetration testers

- System administrators

- Anyone interested in network and host discovery

This course is designed for anyone interesting in nmap, such as ethical hackers, penetration testers, systems administrators, techies and anyone in fact who wants to understand more about the hosts and devices on a given network.

This course assumes a basic understanding of operating systems, networking and the Internet. Nmap can be used on Windows, Mac, Linux, BSD and many other platforms.

Nmap is an important tool that every system administrator, hacker and teachie should be familiar with. If you want to master all of nmap's features this course is designed for you.

30-Days Money Back Guarantee!

You are fully protected by our 100% Satisfaction-Guarantee. If you are unsatisfied with the purchase, contact us in first 30 days and we'll send you a prompt refund.

Frequently Asked Questions

When does the course start and finish?
The course starts now and never ends! It is a completely self-paced online course - you decide when you start and when you finish.
How long do I have access to the course?
How does lifetime access sound? After enrolling, you have unlimited access to this course for as long as you like - across any and all devices you own.
What if I am unhappy with the course?
We would never want you to be unhappy! If you are unsatisfied with your purchase, contact us in the first 30 days and we will give you a full refund.

Get started now!