The Complete Nmap Ethical Hacking Course

Master Nmap (Network Mapper) commands and learn how Nmap performs network scanning, OS detection, and service enumeration on a target host for penetration testing and network security.

4.7
(4,200)
32,000 Students
4.5 Hours
Stage 3 - Intermediate

Last update: Aug 2020

Audio Language: English

Subtitles/Captions: Yes

Type of Training: Online self-paced

Focus: Nmap Training Courses, Penetration Testing Training Courses, Networking Courses

Caption Language: English

The Complete Nmap Ethical Hacking Course

What You’ll Learn

This The Complete Nmap Commands Course for Ethical Hacking will teach you:

  • Nmap Basics:
    Learn basic Nmap commands, how to install Nmap, and configure it for scanning.
  • Port Scanning Techniques:
    Use TCP scan, UDP scan, SYN scan, and Connect scan to identify open TCP ports and closed ports.
  • OS & Service Detection:
    Perform OS detection, service version detection, and fingerprint network devices.
  • Network Mapping & Target Selection:
    Learn network mapping techniques, specify an IP range, and target specific hosts.
  • Advanced Scan Techniques:
    Utilize decoy scans, TCP connections, packet filters, and bypass firewalls for stealth scanning.
  • Command Line Interfaces:
    Execute scans efficiently using the command prompt and CLI tools.
  • Scan Specific Ports:
    Learn how to scan specific ports and analyze vulnerabilities.
  • Nmap Scripting Engine (NSE):
    Use NSE scripts for vulnerability detection and automation.
  • Firewall & IDS Evasion:
    Implement scanning methods to avoid detection and penetration testing restrictions.
  • Nmap Cheat Sheet & Automation:
    Get a comprehensive Nmap cheat sheet for quick reference and learn automation techniques.

Included in the Complete Nmap Ethical Hacking Course

4.5 Hours of On-Demand Video

1 Article

Access on Mobile

Certificate of Completion

Suitable for the Following Careers

Penetration Testers

Ethical Hackers

Network Security Engineers

System Administrators

Cyber Security Analysts

Red Teamers

Network Administrators

Course Content

Training Overview

icon-yt Description of Training Preview
icon-yt Video Overview Preview

Introduction to the Course

icon-yt Introduction to the Instructor Preview
icon-yt Target Audience Preview
icon-yt What is Nmap Preview
icon-yt Course Goals and Learning Objectives Preview

Nmap Cheat Sheet

icon-yt Nmap Cheat sheet Preview

How to Install Nmap

Nmap Basics, Target Specification & Port States

Nmap Discovery and Ping Scanning

Nmap Scan Techniques

Nmap Port Specification, Service, Version & OS Detection

Nmap Scripting Engine (NSE)

Nmap Performance, Firewall and IDS Evasion

Nmap Output and Extras

Zenmap

How Criminal Black Hats Use Nmap with Hacking Infrastructures

Wrap up

Preview

OPEN FULL CURRICULUM

Requirements

Basic knowledge of command line interfaces (CLI) and networking

A computer with VirtualBox or VMware for lab setup

Familiarity with Linux, Windows, or macOS command line

Description of the Complete Nmap Ethical Hacking Course

The Complete Nmap Commands Course for Ethical Hacking is designed to help you master Nmap commands for penetration testing, OS detection, and network mapping. You’ll learn scan techniques for discovering network devices, closed ports, and open TCP ports on your target host while gaining hands-on experience with real-world scenarios.

Throughout the course, you’ll explore Nmap’s capabilities, from installing Nmap to using SYN scans, TCP connect scans, UDP scans, and decoy scans for bypassing firewalls and performing stealth scans. Additionally, you’ll learn how to scan a target system or IP range, extract service detection data, and use Nmap’s scripting engine (NSE) to automate vulnerability assessments.

  • Set up and install Nmap on Linux, Windows, and macOS
  • Perform TCP scan, UDP scan, and SYN scan for different attack surfaces
  • Use command line interfaces to execute Nmap commands
  • Discover network devices and perform network inventory mapping
  • Scan specific ports and detect service versions of running applications
  • Use packet filters and firewall evasion techniques

By the end of this course, you'll have the skills to conduct network security assessments, penetration tests, and identify vulnerabilities using Nmap commands like a professional.

Who Is This Course For

This course is ideal for penetration testers, security analysts, system administrators, and anyone looking to master Nmap for ethical hacking and network security.

Course Instructor

Nathan House

Nathan House, winner of the AI "Cyber Security Educator of the Year 2020" award, has over 30 years of experience in cybersecurity. He has advised some of the largest companies in the world, ensuring security on multi-million and multi-billion pound projects. As the CEO of StationX, a cybersecurity consultancy, Nathan recently led the security efforts on several UK mobile banking and payment solutions, securing over £71Bn in transactions.

His clients include BP, ExxonMobil, Shell, Vodafone, VISA, T-Mobile, GSK, COOP Banking Group, Royal Bank of Scotland, NatWest, Yorkshire Bank, BG Group, BT, and London 2012. Nathan has spoken at numerous security conferences, developed free security tools, and discovered serious security vulnerabilities in leading applications.

He holds a BSc. (Hons) in Computing 'Networks & Communication' with 1st Class Honors and multiple certifications: SABSA Chartered Architect Foundation (SCF), CISSP, CISA, CISM, ISO 27001 Certified ISMS Lead Auditor, CEH, and OSCP.

Read More

Read Less

Testimonials

Anonymous

Tsvetan T.

Nathan is a real expert and goes deep into the topics, paying attention to every detail, focusing on the practical usage and sharing stories from his own experience as a professional penetration tester and security expert. I'd definitely take more of his courses.

Anonymous

Andre N.

Excellent course! Nathan has the best Nmap cheat sheet. Once again thank you for this course.

Anonymous

Joe M.

Lots of excellent info and practical demonstrations on Nmap that will help me in my day-to-day work.

Show More

Show Less

Frequently Asked Questions

Students Who Took This Course Also Liked

Guarantee Your Cyber Security Career with the StationX Master’s Program!

Get real work experience and a job guarantee in the StationX Master’s Program. Dive into tailored training, mentorship, and community support that accelerates your career.

  • Job Guarantee & Real Work Experience: Launch your cybersecurity career with guaranteed placement and hands-on experience within our Master’s Program.
  • 30,000+ Courses and Labs: Hands-on, comprehensive training covering all the skills you need to excel in any role in the field.
  • Pass Certification Exams: Resources and exam simulations that help you succeed with confidence.
  • Mentorship and Career Coaching: Personalized advice, resume help, and interview coaching to boost your career.
  • Community Access: Engage with a thriving community of peers and professionals for ongoing support.
  • Advanced Training for Real-World Skills: Courses and simulations designed for real job scenarios.
  • Exclusive Events and Networking: Join events and exclusive networking opportunities to expand your connections.

TAKE THE NEXT STEP IN YOUR CAREER TODAY!

>

StationX Accelerator Pro

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Accelerator Pro Program. Stay tuned for more!

StationX Accelerator Premium

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Accelerator Premium Program. Stay tuned for more!

StationX Master's Program

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Master’s Program. Stay tuned for more!