watching now
77 Students

54 Lessons

Advanced

What You Will Learn?

  • You will become an expert in using Nmap for ethical hacking, system administration and network security.
  • Learn how to successfully discover active and vulnerable hosts on a network.
  • Discover the secrets of ethical hacking and network discovery, using Nmap on this complete course.
  • You will explore the Nmap Scripting Engine (NSE) used for more advanced discovery and hacking. We look at many scripts including those used for brute forcing passwords in email and databases, cross-site scripting (XSS) and SQL injection (SQLi) discovery and other cool Nmap scripts.
  • And more!

Curriculum

4h 25m
Section 2: Cheat Sheet
01:08
Section 3: Installing Nmap and Cloud Labs
13:42
How to Install Nmap
09:25
Cloud Based Hacking Lab
03:37
Section 4: Nmap Basics, Target Specification & Port States
15:03
Goals and Learning Objectives
00:22
An Introduction to Port Scanning and Fingerprinting
02:18
Nmap Basics
03:39
Nmap Target Specification
05:14
Nmap Port states
03:30
Section 5: Nmap Discovery and Ping Scanning
17:17
Goals and Learning Objectives
00:20
Nmap Discovery Part 1
04:24
Nmap Discovery Part 2
03:53
Nmap Discovery Part 3
04:11
Nmap Discovery Part 4
04:29
Section 6: Nmap Scan Techniques
18:54
Goals and Learning Objectives
00:19
Nmap Scan Techniques - SYN and Connect
06:10
Nmap Scan Techniques - UDP and SCTP
05:51
Nmap Scan Techniques - TCP ACK and Window
01:48
Nmap Scan Techniques - NULL, FIN, Xmas, Maimon Idle Scan and IP Protocol
04:46
Section 7: Nmap Port Specification, Service, Version & OS Detection
20:19
Goals and Learning Objectives
00:20
Nmap Port Specification
05:18
Nmap Service and Version Detection
06:49
Nmap OS Detection
07:52
Section 8: Nmap Scripting Engine (NSE)
39:27
Goals and Learning Objectives
00:25
Nmap Scripting Engine (NSE) Part 1 - Categories
07:35
Nmap Scripting Engine (NSE) Part 2 - Usage and Cool Scripts
08:08
Nmap Scripting Engine (NSE) Part 3 - Usage and Cool Scripts
09:16
Nmap Scripting Engine (NSE) Part 4 - Usage and Cool Scripts
10:02
Writing Nmap Scripting Engine (NSE) Scripts
04:01
Section 9: Nmap Performance, Firewall and IDS Evasion
15:36
Goals and Learning Objectives
00:20
Nmap Timing and Performance
04:19
Nmap Firewall / IDS Evasion and Spoofing Part 1
05:49
Nmap Firewall / IDS Evasion and Spoofing Part 2
05:08
Section 10: Nmap Output and Extras
16:16
Goals and Learning Objectives
00:25
Nmap Output
07:15
Nmap Output & Miscellaneous Options
04:50
Extras
03:46
Section 11: Zenmap
19:51
Goals and Learning Objectives
00:25
How to Use Zenmap - Nmap GUI
08:07
Zenmap Built-in Profiles
06:51
How to use the Zenmap Profile Editor
04:28
Section 12: How Criminal Black Hats Use Nmap with Hacking Infrastructures
09:23
Goals and Learning Objectives
00:29
Command and Control (C&C) Hacking Infrastructure
08:54
Section 13: Wrap up
00:23
Congratulations
00:23
Section 14: Preview Lectures
1:09:18
Preview Introduction
00:18
Password cracking part 1
16:18
Password cracking part 2
07:10
Bypassing firewalls and HTTP proxies part 3
15:21
Choosing an E-Mail provider
13:47
Router Vulnerability Scanning (Shodan, Qualys)
16:24

Description

Requirements

  • A basic understanding of using operating systems, networks, TCP/IP and the Internet.
  • A willingness to learn.
  • Nmap can be used on Windows, Mac, Linux, BSD and many other platforms.

About the Instructor

Reviews 10
Students 2,199
Massive audience
Courses 5

Nathan has over 24 years experience in cyber security where I have advised some of largest companies in the world, assuring security on multi-million and multi-billion pound projects. He is the CEO of Station X a cyber security consultancy. More recently he acted as the lead security consultant on a number of the UKs mobile banking and payment solutions helping secure to date over £71Bn in transactions.

BitDegree platform reviews

Our students say Excellent
9.5 out of 10
trustpilot logo 1 trustpilot logo