Course curriculum

  • 1

    Learn Nmap for Ethical Hacking

    • Port Scanners Essentials

      FREE PREVIEW
    • What is Nmap

    • Preparing the Environment

    • Scanning Techniques of Nmap - Theory Lectures

    • UDP Scan (-sU)

    • FIN Scan (-sF)

    • Ping Scan (-sP)

    • TCP SYN Scan (-sS)

    • TCP Connect() Scan (-sT)

    • Version Detection (-sV)

    • Idle Scan (-sI)

    • Nmap For Ethical Hackers Lectures

    • Basic Nmap Scan against IP or host - Theory

    • Basic Nmap Scan against IP or host - Hands On

    • Nmap Ping Scan - Theory

    • Nmap Ping Scan - Hands On

    • Scan specific ports or scan entire port ranges - Theory

    • Scan specific ports or scan entire port ranges - Hands On

    • Scan multiple IP addresses - Theory

    • Scan multiple IP addresses - Hands On

    • Scan the most popular ports - Theory

    • Scan the most popular ports - Hands On

    • Scan hosts and IP addresses reading from a text file - Theory

    • Scan hosts and IP addresses reading from a text file - Hands On

    • Save your Nmap scan results to a file - Theory

    • Save your Nmap scan results to a file - Hands On

    • Disabling DNS name resolution - Theory

    • Disabling DNS name resolution - Hands On

    • Scan + OS and service detection with fast execution - Theory

    • Scan + OS and service detection with fast execution - Hands On

    • Detect service/daemon versions - Theory

    • Detect service/daemon versions - Hands On

    • Scan using TCP or UDP protocols - Theory

    • Scan using TCP or UDP protocols - Hands On

    • Nmap Scripting Engine (NSE) Lectures

    • CVE detection using Nmap - Theory

    • CVE detection using Nmap - Hands On

    • Launching DOS with Nmap - Theory

    • Launching DOS with Nmap - Hands On

    • Launching brute force attacks - Theory

    • Launching brute force attacks - Hands On

    • Detecting malware infections on remote hosts - Theory

    • Detecting malware infections on remote hosts - Hands On

    • Nmap Firewall and IDS Evasion - Theory Lectures

    • Fragment Packets - Theory

    • Specify a specific MTU - Theory

    • Use Decoy addresses - Theory

    • Idle Zombie Scan - Theory

    • Source port number specification - Theory

    • Append Random Data - Theory

    • Scan with Random Order - Theory

    • MAC Address Spoofing - Theory

    • Send Bad Checksums - Theory