Course Overview

This course starts with basics with TCP/IP Model and OSI Model and how it can be used in our day-to-day life. We will also learn TCP, UDP Packets, and Topologies to make our base stronger and then further move on to Ports and Protocols usage with practicals. This course covers all the Nmap Scan Types with Wireshark Packet Analysis for a better understanding of what’s happening behind the hood. The course also includes principles for each scan type and its Advantages and Disadvantages for Network Scans. 

With this course, you will learn Target Selection Techniques for Host, Subnet Scans & Host Discovery. You will also learn how to choose large hosts from files and choose random hosts and also how to exclude them from our scans. This course will cover port scanning and port knocking, which are useful for penetration Testing & CTFs. Then, we will see how to perform Service Version Detection for vulnerable services for exploitation. We will perform OS Detection and fuzzy scripts to identify the underlying targeted OS. This course will also cover Nmap output formats to save the output in different formats like HTML and XML. You will also learn how we can convert XML to CSV format for Recon of Bug Bounty & Penetration Testing. It will cover script scans and use Nmap’s powerful scripting engine for scanning. Next, we will cover the Nmap Script attack for different categories like Safe, Vulnerability, DOS, Exploit, Not Intrusive, and Boolean Expressions. We will cover Nmap for reconnaissance for Bug Bounty and Pentesting. In this course, you will go through Nmap protocols and exploitation in which you will see protocols such as FTP, SSH, HTTP, and their exploitation. Here, we will also cover HTTP Basic Auth Exploitation and PUT to RCE using Nmap. This course covers custom NSE scripts and their anatomy and teaches how to write your own scripts. You will understand how to cover Nmap timing parameters and firewall analysis to bypass firewalls with Nmap parameters. Next, you will learn Nmap Timing and Performance to tune Nmap Scans for better results and performance. You will learn how to bypass timing-based firewalls with Nmap. You will learn how to Bypass IDS and Firewalls with Mac Spoofing, cloak scan with decoys, Faking TTL, and add Bogus TCP/UDP Checksums. Lastly, we will write our own Python program for scanning and OS Detection based on Nmap. 

By the end of this course, you will have mastered Nmap to perform ethical hacking. 

Notes: This course is created for educational purposes only and all the websites the author has performed attacks are ethically reported and fixed. Testing any website which doesn’t have a Responsible Disclosure Policy is unethical and against the law, the author doesn’t hold any responsibility. 

What You Will Learn

  • Learn how networks are connected and types of networks
  • Learn Nmap for ethical hacking
  • system administration and network security
  • Learn how to successfully discover active and vulnerable hosts on a network
  • Learn fundamentals of TCP IP vs OSI Model
  • Learn what are Ports and Protocols & usage practically
  • Learn Network Types and its Fundamentals
  • Learn Network Topologies and its interconnection
  • Learn Nmap Scan Types with Breakdown of each Scan
  • Learn & discover the Host Identification & network discovery
  • Learn Scan Types Advantages and Disadvantages
  • Learn Scan Types Principles + Packet Breakdown
  • Learn Port Scanning Techniques
  • Learn Port Knocking for Pentesting and CTF's
  • Learn Service Version Detection of Vulnerable Servers
  • Learn OS Detection of running servers with fuzzy scripts

Program Curriculum

  • Introduction to Nmap
  • Legal Considerations
  • TCP IP and OSI Model
  • OSI Model in Day-to-Day Life
  • TCP IP vs. OSI Model
  • TCP UDP Fundamentals and 3-way Handshake
  • What is Internet, Intranet, and Extranet
  • Network Types Fundamentals
  • Network Topologies Fundamentals
  • IP and Mac Address Fundamentals
  • Ports and Protocols Fundamentals
  • $7 Million Cybersecurity Scholarship by EC-Council
  • Chapter 1 Quiz

  • Ports and Protocols: FTP
  • FTP on Free Live Server
  • Ports and Protocols: SSH
  • Ports and Protocols: SSH, Telnet, vs RDP
  • Ports and Protocols: SMTP, POP3, & IMAP4
  • Ports and Protocols: DNS
  • Ports and Protocols: DHCP
  • Ports and Protocols: HTTP and HTTPS
  • Chapter 2 Quiz

  • Nmap Installation on Windows
  • Nmap Installation on Linux
  • Nmap Installation on Mac OS
  • Wireshark Installation on Mac OS
  • Wireshark Install Linux Users
  • Chapter 3 Quiz

  • NCP TCP Scan
  • Nmap TCP Stealth Scan
  • Nmap NULL Scan
  • Nmap UDP Scan
  • Nmap FIN Scan
  • Nmap XMAS Scan
  • Nmap ACK Scan
  • Nmap IDLE or ZOMBIE Scan
  • Nmap Scan Types Summary: Revision
  • Chapter 4 Quiz

  • Nmap IP Address and Host Scan
  • Nmap IP Range Scan
  • Nmap Host Subnet Scan
  • Nmap Host Subnet Scan Fast
  • Nmap Host Discovery
  • Netdiscover vs Nmap
  • Arpscan vs Nmap
  • Nmap Large Target/Input List Scan
  • Nmap Choose Random Hosts
  • Nmap Exclude Hosts from Network
  • Nmap Exclude Hosts from Files
  • Nmap No Host Discovery Scan / Bypassing Windows Firewall Rule
  • Chapter 5 Quiz

  • Nmap Port Scanning Names
  • Nmap Port Scanning
  • Nmap Scan Open Ports
  • Nmap Port Knocking
  • Nmap Fast Port Scan
  • Nmap Quick Save & Append Output
  • Nmap Port Scan No Randomize/Sequential
  • Nmap Top Ports Scan
  • Nmap Ports Ratio Scan
  • Nmap Port Scan Summary: Revision
  • Chapter 6 Quiz

  • Nmap Service Version Detection
  • Nmap Service Version Intensity
  • Nmap Service Version Light
  • Nmap Service Version All
  • Nmap Service Version Trace
  • Chapter 7 Quiz

  • Nmap OS Detection
  • Nmap OS Detection Max-retries
  • Nmap OS Detection Scan Limit
  • Nmap OS Detection Fuzzy
  • Nmap OS Detection Script
  • Chapter 8 Quiz

  • Nmap Normal Output
  • Nmap XML Output
  • Nmap XML to HTML Output
  • Nmap XML to CSV for Recon
  • Nmap Greppable Output
  • Nmap Script Kiddie Output
  • Nmap All Outputs
  • Chapter 9 Quiz

  • Nmap Default Script Scan
  • Nmap Script Help & Usage
  • Nmap Script Arguments
  • Nmap NSE Script Scan
  • Nmap Scan with Scripts Sets
  • Nmap Updating the Database
  • Chapter 10 Quiz

  • Nmap Safe Scripts
  • Nmap Vulnerability Scripts
  • Nmap DOS Scripts
  • Nmap Exploit Scripts
  • Nmap Intrusive Scripts
  • Nmap Malware Script Scan
  • Nmap Not Including Scripts Scan
  • Nmap Boolean Expression Scan
  • Chapter 11 Quiz

  • Nmap Traceroute Scan
  • Nmap Trace Traffic & Geo Resolving
  • Nmap DNS Bruteforce
  • Nmap Whois Scan
  • Nmap Robots File Scan
  • Nmap WAF Detect
  • Nmap WAF Fingerprint
  • Wafw00f vs Nmap Scan
  • Nmap Firewalk Detect Firewalled Ports
  • Nmap Email Enumeration
  • Nmap Sitemap Generation Scan
  • Nmap Crawler Tester Scan
  • Nmap Discovering Directories Scan
  • Dirsearch Directories Bonus
  • Chapter 12 Quiz

  • Nmap SMTP Open Relay Scan
  • Nmap SMTP User Enum Scan
  • Nmap SMTP Password Attack
  • Nmap Backdoor Detect Scan
  • Nmap POP3 Scan
  • Nmap IMAP Scan
  • Chapter 13 Quiz

  • Nmap Cloak Scan with Decoys
  • Nmap Select Interface
  • Nmap Spoof MAC Address
  • Nmap Modify Source Port Scan
  • Nmap Fake TTL
  • Nmap Relay Proxies
  • Nmap Bogus TCP/UDP Checksum
  • Nmap Fragment Scan
  • Nmap MTU Scan
  • Chapter 14 Quiz

  • Creating Your Own Port Scanner
  • Nmap with Python Scans
  • Chapter 15 Quiz

  • Zenmap Installation
  • Zenmap Overview
  • Zenmap Scans
  • Zenmap Create Your Own Profile
  • Zenmap Output Exporting
  • Chapter 16 Quiz

  • Scan Comparison Using Ndiff
  • Ndiff XML Output
  • Chapter 17 Quiz
Load more modules

Instructor

RLBC

Founded in 2019, RLBC is a content production consulting company based in Versailles, France. RLBC works with a team of SME professionals in the fields of Fintech, IT, and content marketing. The company produces digital education content for on-trend SME topics. For the NFT data science subject matter the team, better known as the NFT Guys, includes George, an IT industry veteran leading and managing engineering teams in the cybersecurity-critical sector from Brussels, who is well-versed in creating NFTs, and Robert, a veteran Fintech lecturer and maître conferencier in finance & accounting from New York. Robert is the author of Fashion and Art Coins published on pages 115 – 120 of Edmunds, John C., Editor (2020) Rogue Money and the Underground Economy, An Encyclopedia of Alternative and Cryptocurrencies, Greenwood: ABC – CLIO.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8