Network scanning is the process of assessing a network to identify an active host network, which will either be an attacker or a medium for security assessment. This procedure plays an extremely vital role in risk assessment programs or when preparing a security plan for your organization.
This course picks up where Learning Practical Network Scanning finished and focuses on the most widely available customization network scanning tool: Nmap. Sills learned with Nmap can be later applied to many other applications.
First, it starts by understanding various methods to define scanning targets. Next, the course covers understanding (and adjusting) how ports are scanned and applications and operating systems are detected. Later, it explains how to detect and bypass firewalls and perform scripting to make common tasks easy to repeat.
Style and Approach
Throughout this video course, you’ll explore the host which must be discovered and placed into a target list for Nmap. You’ll learn how to adjust the way Nmap scans ports, how to use scripts, and how to create your own to automate tasks.
Table of Contents
Applications and Operating Systems
What You Will Learn
Learn how various Nmap detection algorithms function
Optimize Nmap to reduce your scan times and be as efficient as possible
Bypass firewalls and trick IDS to ensure your network scans work correctly
Learn how to create scripts to automate Nmap tasks