Library

Course: Ethical Hacking - The Most Advanced Level NMAP Course

Ethical Hacking - The Most Advanced Level NMAP Course

  • Life Time Access
  • Certificate on Completion
  • Access on Android and iOS App
  • Self-Paced
About this Course

In this course you will learn about computer network penetration testing using NMAP. NMAP is most popular tools in IT world. This tool is widely use by Computer Experts, Penetration Testers, Ethical Hackers, System Administrators, Network Engineers. This tool has great capability to collect information about computer networks. You will learn from lab setup to complete network scanning using NMAP. I will guide you step by step to prepare lab and use NMAP. This course will give you complete knowledge about network scanning. After completion of this course you will be able to find vulnerabilities of network. This course is complete ethical hacking and penetration testing based course. To be a good ethical hacker or penetration tester, you must have knowledge about NMAP. I am using kali linux as platform to demonstrate all the lectures. This course will give you complete knowledge about full scan,half scan,three-way handshake process,FIN scan,XMAS scan,TCP scan,UDP scan,IDLE scan, Null Scan. This course will help a lot to those who are already working as IT engineers and who wants to start their career in the field of penetration testing or ethical hacking. Computer network scanning is a most important phase of ethical hacking. You will learn complete network scanning using open source based tool.

One of the most important feature that Nmap has ability to detect remote operating systems and software. It is very helpful during a penetration testing to know about the operating system and the software used by the remote computer because you can easily predict the known vulnerabilities from this information.

Basic knowledge
  • Students must have knowledge about computer networks
  • Computer network security knowledge will be advantage
What you will learn
  • Students will learn to scan entire computer network in their organization or company
  • Student will learn about complete network scanning using NMAP
  • Objective of network scanning
  • To find live hosts,ports,ip address of live host
  • To discover operating system on target host
  • To discover services running on hosts
  • To find vulnerabilities
  • What is ping
  • What is ping sweep
  • Three-way handshake
  • TCP communication flag
  • Different type of scanning concepts
  • TCP based scanning
  • UDP based scanning
  • Preparing lab setup at your home
  • Host discovery
  • Port scanning basics
  • Port scanning techniques
  • Port specification and scan order
  • Service and version detection
  • OS detection
  • NMAP scripting engine
  • Timing and performance
  • Firewall/IDS evasion and spoofing
Curriculum
Number of Lectures: 38
Total Duration: 02:40:45
Introduction about network scanning
  • What is network scanning?  

    In this lecture you will learn about network scanning definition.

  • Find live devices in the computer network  

    In this lecture you will understand complete theory concept of finding live devices on the computer network.

  • How to get live host devices information using subnet or range of ip addresses  

    In this lecture you will learn concept of about how to gather live hosts information using subnet.

  • Understanding about three way handshake process  

    In this lecture you will learn about three-way handshake process.

Preparing lab setup
  • How to download vmware workstation player  

    In this video you will learn to download vmware workstation player with safety.

  • How to install vmware workstation player  

    In this video you will learn how to install vmware workstation player into your pc.

  • Deploy metasploitable 2  

    In this video you will learn how to deploy metasploitable 2 into virtualization environment, What is metasploitable, what is vmware workstation software, how to use metasploitable etc..

  • How to download kali linux operating system image file  

    In this video you will learn how to download kali linux's image file.

  • Deploy Kali Linux into virtualization environment  

    In this video you will learn to deploy kali linux stepwise.

  • Install vmware tools in kali linux vm  

    In this video you will learn to install vmware tools in kali linux.

NMAP Overview
  • Nmap Introduction  

    In this lecture you will learn about complete introduction of nmap.

Host Discovery
  • Overview of host discovery  

    In this lecture you will learn about host discovery quick idea.

  • Lets perform ping test  

    In this lecture you will learn to check ip addresses of each machines and perform ping test , wireshark configurations and windows firewall configurations.

  • Specifying target host in nmap command  

    In this lecture you will learn how to get important information about target by running simple nmap command.

  • Specifying target networks in nmap command  

    In this video lecture you will learn to specifying target networks using nmap and get information about it.

  • Specifying target hosts and networks more advanced level  

    In this lecture you will learn more advanced level options than previous lecture.

  • Finding an organization's ip address  

    In this lecture you will learn to get dns record information about target organization.

  • Setting up dns server and creating some dns records  

    In this lecture you will learn to setup dns server and dns server's record. This video lecture will guide you to prepare DNS lab at your home so you don't need to perform it on internet accidentally.

  • Zone transfer practice in our own lab  

    In this video lecture you will learn zone transferring in our own lab. You will also learn common mistake done by system administrator in dns configurations which leads dns based attack.

  • Nmap reverse-dns and traceroute  

    In this lecture you will learn to find ip address information associated with domain name, ports information and traceroute information.

  • List scan  

    In this lecture you will learn about list scan. List scan gives you surity that you have proper Ip addresses for your organization.

  • Disable port scan  

    In this lecture you will learn how to perform reconnaissance of a target network quickly and without attracting much attention.

  • Disable ping scan  

    In this lecture you will learn about disable ping scan.

  • ICMP echo request using nmap  

    In this lecture you will learn to perform icmp echo request using nmap.

  • TCP SYN Ping  

    In this lecture you will learn about tcp syn ping.

  • Attempted ACK Ping  

    In this lecture you will learn to discover host by sending ACK ping.

  • UDP Ping  

    In this lecture you will learn to discover host using UDP ping.

  • ARP Scan  

    In this lecture you will learn about ARP scanning usinig nmap.

Port Scanning
  • Introduction to port scanning  

    In this lecture you will learn about introduction of port scanning.

  • NMAP simple command  

    In this lecture you will learn about simple nmap command.

  • Scan a large computer network for a certain open TCP port part 1  

    In this lecture you will learn to get information about large network by scanning tcp port.

  • Scan a large computer network for a certain open TCP port part 2  

    In this lecture you will learn to get information about large network by scanning tcp port.

  • TCP connect scan  

    In this lecture you will learn about TCP connect scan.

  • TCP SYN, FIN, NULL and XMAS Scans  

    In this lecture you will learn about TCP SYN, FIN, NULL and XMAS Scans

  • Custom SYN/FIN scan  

    In this lecture you will learn about custom SYN/FIn scan

  • TCP ACK scan  

    In this lecture you will learn about TCP ACK scan.

  • TCP windows scan  

    In this lecture you will learn about TCP windows scan.

  • IDLE Scanning  

    In this lecture you will learn about in depth concept of IDLE scanning.

Reviews (0)