4.3  54 reviews on Udemy

Hacking with Nmap in Kali Linux

Understanding how the nmap tool can be used in a Penetration Test
Course from Udemy
 2472 students enrolled
 en
Proficiently use nmap to conduct scanning of remote targets.

I'm sure you have heard of nmap before. It has been around since the 90's and featured in many movies and TV series involving technology.

In this course, I will quickly show you in great detail how to use nmap to scan and enumerate a target. Including, but not limited to; 

Scanning hosts to find alive hosts

Scanning open ports, and understanding closed ports, with firewalls. 

Enumerating services and software versions accurately

Enumerating a targets Operating System to better gauge the next phase of attack

Putting it all together, generating a nice report that we then convert to an html file. 

Hacking with Nmap in Kali Linux
$ 19.99
per course
Also check at

FAQs About "Hacking with Nmap in Kali Linux"

About

Elektev is on a mission to organize educational content on the Internet and make it easily accessible. Elektev provides users with online course details, reviews and prices on courses aggregated from multiple online education providers.
DISCLOSURE: This page may contain affiliate links, meaning when you click the links and make a purchase, we receive a commission.

SOCIAL NETWORK