Real Power of Nmap: Master Network Scanning, Reconnaissance and Exploit Discovery for Effective Penetration Testing
Instructed by OCSALY Academy 10 hours on-demand video, 2 practice tests & 5 downloadable resources
What you’ll learn
-
Nmap’s network scanning capabilities and how to use them effectively.
-
Utilizing NSE scripts to enhance scanning and exploit discovery.
-
Port scanning techniques and methodologies for servers.
-
Selecting the appropriate network interface for scanning tasks.
-
Targeting specific hosts or ranges using target and exclude lists with CIDR notation.
-
Operating system detection using Nmap.
-
Legal considerations and compliance when conducting random port scanning.
-
Unique techniques specific to Nmap for gaining an edge in scanning and reconnaissance.
-
Advanced TCP ACK and SYN scan techniques and their applications.
-
Leveraging ICMP for advanced scanning purposes.
-
The importance and fundamentals of reconnaissance in information gathering.
-
IP geolocation and WhoIS queries using Nmap.
-
Conducting graphical traceroutes for visualizing network communication paths.
-
Understanding the potential risks associated with different HTTP methods and scanning for them.
-
Searching for valuable information and potential vulnerabilities in web servers, aka “Digital Gold.”
-
Understanding the basics of network protocols and their functions.
-
Exploring the layers of the TCP/IP model and their roles in network communication.
-
Learning the process of sending and receiving emails over the internet.
-
Understanding the concept of Protocol Data Units (PDU) and how they are used in networking.
-
Exploring the basic use of switches and data transmission in a network.
-
Learning how two networks communicate with each other using a router.
-
Getting an introduction to networking and its fundamental concepts.
-
Understanding the concept of internetworking and its importance in connecting networks.
-
Exploring different types of area networks (ANs) and their characteristics.
-
Learning about Local Area Networks (LANs) and their use in connecting devices within a limited area.
-
Understanding the concept of Metropolitan Area Networks (MANs) and their role in connecting cities or large areas.
-
Exploring Wide Area Networks (WANs) and their use in connecting geographically dispersed networks.
-
Introduction to sections and fundamentals of media control filtering in networking.
-
Exploring Linux Wireless Access Points (WAP) and bypassing MAC filtering techniques.
-
Creating a personal Nmap/Ethical Hacking laboratory for practical learning.
-
Getting started with networking concepts and tools.
-
Installing and setting up virtual machines for networking experiments.
-
Installing and configuring Kali Linux, a popular penetration testing distribution.
-
Installing Metasploitable, a vulnerable virtual machine for practicing security testing.
-
Understanding and using various Linux commands and pipes for efficient system management.
-
Exploring the concept of commands in Linux and how they are used to perform specific tasks.
-
Demonstrating examples of using pipelines in Linux for processing and manipulating data.
-
Exploring unusual LS (list) command options and their functionalities.
-
Learning and using different Linux commands in conjunction with pipes for advanced data processing.
-
Understanding key concepts related to Linux operating systems and their functionalities.
-
Finding and utilizing helpful manuals and documentation in the Linux environment.
-
Exploring Linux directories and their structure for effective file system navigation.
-
Continuing the exploration of Linux directories and their significance in organizing files and programs.
-
Understanding the shell and its role as an intermediary between the user and the Linux system.
-
Gaining knowledge about the fundamentals of processes in a Linux system and how they interact with the operating system.
Similar Course Coupons
Deal Score-1
Disclosure: This post may contain affiliate links and we may get small commission if you make a purchase. Read more about Affiliate disclosure here.