Learn Nmap reconnaissance

Know your network vulnerabilities using the Nmap tool. fast and easy !

Instructed by ofer shmueli

  • Includes all Standard Features
  • Get Unlimited access to all the courses
  • No Contract. Cancel Anytime
Starting in just $19 / mo see all plans
Subscribe Now
$ 299
Annual Subscription
  • One year Unlimited Access
  • Access to all courses
    You will be able to access all the courses from any category on the platform.
  • Learning paths access
  • Access Assignments & Projects
  • Access on Mobile, PC and Tablet
  • Pause & Resume Courses Anytime
  • Offline viewing
  • Instructor Support
  • Course Completion Certificates
  • Cancel Anytime
Subscribe Now
  • You will learn the techniques used by Nmap to discover your network appliances and vulnerabilities

 THE COMPLETE GUIDE TO RECONNAISSANCE WITH Nmap

The goal of this course is to help you learn the basic fundamentals of reconnaissance for ethical hacking.

The art of Nmap reconnaissance  is the most fundamental tool for every ethical hacker

This course will help you  to become a better Visualize your network and understand its vulanrebilities  

 

WHAT WILL YOU LEARN

When you master Nmap, you also master network protocols and TCP-IP

  • here You will learn of major network protocols : UPNP, DHCP, SMB, HTTP, DNS  and how to use their weaknesses and discover valuable information on the network you wish to pen test

  • Craft your own TCP and ICMP Probes

  • discover hosts on the network

  • scan for open, closed, filtered and unfiltered ports

  • Understand how Nmap works behind the scenes

  • Evade FW

  • Practice the best discovery Nmap Scripts

     

  • Lots of Motivation, TCP Basic Understanding , computer in hand
  • IT managers, network administrators , anyone who is interested in Pentesting
View More...

Section 1 : Introduction

  • Lecture 1 :
  • Lecture 2 :
  • Set Up
  • Lecture 3 :
  • Nmap Help

Section 2 : Fundamentals

  • Lecture 1 :
  • TCP Handshake Part 1
  • Lecture 2 :
  • TCP HandShake Part 2
  • Lecture 3 :
  • TCP HandShake Part 3

Section 3 : Host Discovery

  • Lecture 1 :
  • Ports
  • Lecture 2 :
  • Timing Options
  • Lecture 3 :
  • Max RTT Timeout
  • Lecture 4 :
  • Host Discovery
  • Lecture 5 :
  • Customise ICMP
  • Lecture 6 :
  • Customise TCP Ping
  • Lecture 7 :
  • TCP Ping + ARP
  • Lecture 8 :
  • ARP Table
  • Lecture 9 :
  • Scan From A text List
  • Lecture 10 :
  • Out Scan Results To A Text File

Section 4 : Port Scanning

  • Lecture 1 :
  • TCP Connect Scan
  • Lecture 2 :
  • TCP Syn Scan
  • Lecture 3 :
  • TCP Ack Scan
  • Lecture 4 :
  • Xmas Scan
  • Lecture 5 :
  • FIN Or Syn
  • Lecture 6 :
  • Customise TCP Flags
  • Lecture 7 :
  • UDP Scan + Max Retries Option

Section 5 : Service Version And OS Detection

  • Lecture 1 :
  • Service Version + intensity
  • Lecture 2 :
  • OS Detection

Section 6 : Evading Firewalls

  • Lecture 1 :
  • Evading FW part 1
  • Lecture 2 :
  • Evading FW Part 2

Section 7 : TroubleShooting

  • Lecture 1 :
  • Troubleshooting

Section 8 : Nmap Scripting

  • Lecture 1 :
  • Intro to scripts
  • Lecture 2 :
  • Find Users With SNMP
  • Lecture 3 :
  • SNMP Computer Info
  • Lecture 4 :
  • SNMP Interfaces
  • Lecture 5 :
  • SNMP Software Info
  • Lecture 6 :
  • NetBios Name
  • Lecture 7 :
  • SMB Grab Info
  • Lecture 8 :
  • SMB Shares Script
  • Lecture 9 :
  • HTTP Enum
  • Lecture 10 :
  • DNS Cache Snoop Script
  • Lecture 11 :
  • DHCP Discover Script
  • Lecture 12 :
  • UPNP Info Script

ofer shmueli,

I have 15 years of experience in Network  security and  Wi-Fi deployments. i have worked as a director of products, innovation and development in telecom companies ( orange IL ) and VP product for professional services companies.  I have a Ruckus Wi-Fi WISE certification , a Cisco CCNA R&S certification and a NSE4 Fortinet certification Wi-fi and security are a true passion of mine,  it is making a difference in people's life everywhere . in IOT, Location based apps, Retail, Automation and more. I built this course, for people like you, who are always looking and, Passionate to understand the key technologies used today.

View More...
learn-nxtgen-hacking-with-technology

Learn NxtGen Hacking with Technolog...

By : Gopikrishna C

Lecture 80

tcp-ip-the-complete-course

TCP/IP: The Complete Course

By : Lazaro (Laz) Diaz

Lecture 17

the-complete-ethical-hacking-certification-course

The Complete Ethical Hacking Certif...

By : Mohamed Amer

Lecture 151

voip-configuration-and-attacking-hacking

VoIP Configuration and Attacking (H...

By : Arpit Mittal

Lecture 6

cissp-certification-introduction

CISSP- Certification Introduction

By : MUKESH SINGH

Lecture 18

practical-blockchain-smart-contracts-ethereum-solidity

Practical Blockchain & Smart Contra...

By : Abhilash Nelson

Lecture 40

Sign up and start learning
By signing up. you agree to our Terms of Use and Privacy Policy
Forget Password