Tags
Language
Tags
July 2025
Su Mo Tu We Th Fr Sa
29 30 1 2 3 4 5
6 7 8 9 10 11 12
13 14 15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30 31 1 2
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Network Security Auditing with nmap

    Posted By: ELK1nG
    Network Security Auditing with nmap

    Network Security Auditing with nmap
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44100 Hz
    Language: English | Size: 3.26 GB | Duration: 7h 43m

    Learn to perform network security scanning with nmap in the right way.

    What you'll learn
    Network Security
    Network Scanning
    nmap
    Ethical Hacking
    Penetration Testing
    Security Auditing
    Vulnerability Scanning
    Requirements
    A Basic familiarity on networking fundamentals
    Basics of linux command line interface.
    Familiarity with working and setup of virtual machines in his/her laptop/desktop.
    Fundamentals of ports and services.
    Description
    Course Snapshot

    Nmap is the most popular and flexible tool widely used by Penetration testers, network administrators, security enthusiasts & bug bounty hunters. Nmap offers a ton of options to perform scans. This course is created to master the nmap tool with clear and easy to follow instructions & hands-on demonstrations.

    The contents & techniques in the course are derived from my experience as a network & web application pentester. So, I will be touching on the most relevant & straight forward techniques that actually have worked during my experience on-field.

    The course will start with explanation on Basics of TCP 3-way handshake to build up the base for nmap scans to advanced for performing network security assessments with nmap security scanner.

    Practical examples and underlying concepts of nmap scanner and will teach you on:

    Getting started with nmap

    Fundamentals of scanning.

    Basic scan techniques of nmap

    Detecting hosts, Operating Systems & Service versions.

    Useful Nmap script scans for vulnerability detection & auditing services.

    Creating scan profiles on Zenmap - Frontend for nmap.

    Evading and testing firewalls

    Improving scan performance

    Report creation

    Automating nmap scans

    At the end of the course, you will be proficient in:

    Port scanning techniques & fine-tune nmap for speed & accuracy.

    Implement the options provided by nmap scripts to perform complex scans in one go.

    With powerful Nmap Scripting Engine, perform vulnerability assessments for webservers, mail servers, web applications.

    Do password auditing for active services like FTP, TELNET, SSH, etc.

    Test for misconfigured firewalls/IDSes and bypass weak rulesets.

    Create nmap scan reports, Automate and manage network-wide scans, monitor the assets for any misconfigurations and/or vulnerabilities.

    Who this course is for:
    Ethical hackers or Penetration testers desiring to sharpen their skills and do accurate security assessments.
    Network administrators who want to secure their network assets, perform security audit of the running services.
    Students who want to enter the field of network security & ethical hacking.