Description
In this course you will learn about network penetration testing using NMAP. NMAP is most popular tool in ethical hacking world. This tool is widely use by Penetration Testers, Ethical Hackers, System Administrators, Network Engineers. This tool has great capability to gather information about computer networks. In this course you will learn from lab setup to complete network scanning using NMAP.This course will give you complete knowledge about network scanning. After completion of this course you will be able to find weaknesses and vulnerabilities of network. This course is complete ethical hacking based course. To be a good ethical hacker, you must have knowledge about NMAP. In this course i am using kali linux as platform {you can download kali linux couse free from here}. This course will give you complete knowledge about full scan,half scan,three-way handshake process,FIN scan,XMAS scan,TCP scan,UDP scan,IDLE scan, Null Scan. This course will help a lot to those who are already working as IT professionals and who wants to start their career in the field of penetration testing or ethical hacking. Network scanning is a most important phase of ethical hacking. In this course you will learn complete network scanning using open source based tools.
One of the most important feature that Nmap has ability to detect remote operating systems and software. It is very helpful during a Ethical Hacking to know about the operating system and the software used by the remote computer because you can easily predict the known vulnerabilities from this information.
Fees: Worth of 8000INR (free for you)
Content
01 Scan entire computer network in their organization or company
02 Network scanning of ethical hacking
03 About NMAP
04 Objective of network scanning
05 To find live hosts,ports,ip address of live host
06 To discover operating system on target host
07 To discover services running on hosts
08 To find vulnerabilities
09 What is ping
10 What is ping sweep
11 Three-way handshake
12 TCP communication flag
13 Different type of scanning concepts
14 TCP based scanning
15 UDP based scanning
16 Preparing lab setup at your home
17 Host discovery
18 Port scanning basics
19 Port scanning techniques
20 Port specification and scan order
21 Service and version detection
22 OS detection
23 NMAP scripting engine
24 Timing and performance
25 Firewall/IDS evasion and spoofing
Comments
Post a Comment