Nmap Essentials (CS8508)

This course demonstrates how to run basic and advanced scans, optimizing them to perform well in a variety of environments. Starting with an overview of Nmap, the reader will be guided through installation on popular operating systems. The course then explains how to use Nmap to run basic and advanced scans in addition to using the Nmap Scripting Engine (NSE). All this helps with optimizing Nmap performance in a variety of environments, eventually enabling the reader to integrate with other Nmap tools such as Nessus, Nikto, Burp Suite, and NSE versus NASL scanning.

By the end of the course, the participant will have gained essential insights into network security analysis.

A preferential rate (-15%) applies to the regular cost for non-profit organizations, as well as the government sector. In addition, you can benefit from additional advantages through a corporate agreement when you need to train several people or teams in your company. Contact us for details.

Public class

3 days / 21 hours

Private class

Virtual classroom
Minimum no. of participants: 4
3 days / 21 hours
Price on request
English or Serbian
Training plan: 

Module 1: Introduction to Nmap

  • Nmap's humble beginnings
  • The many uses of Nmap
  • Installing Nmap
  • Building Nmap from source
  • Summary

Module 2: Network Fundamentals

  • The structure of the Internet
  • The OSI model
  • Port scanning
  • TCP and UDP
  • Service banners
  • Summary

Module 3: Nmap Basics

  • How to choose a target
  • Running a default scan
  • Service version scans
  • Logging scans
  • Specified scan ranges
  • Understanding the reason flag
  • Summary

Module 4: Advanced Nmap Scans

  • Host detection methods
  • Running a ping agnostic scan
  • Scanning UDP services
  • Special TCP scans
  • Operating system detection
  • Increasing verbosity in scans
  • Packet tracing
  • Summary

Module 5: Performance Optimization

  • Nmap timing optimization
  • Customized host group sizes
  • Increasing and decreasing parallelism
  • Dealing with stuck hosts
  • Delaying and increasing probe rates
  • Summary

Module 6: Introduction to the Nmap Scripting Engine

  • The history of the NSE
  • The inner working of the NSE
  • Finding Nmap scripts
  • Running Nmap scripts
  • Summary

Module 7: Writing Nmap Scripts

  • Anatomy of an Nmap script
  • Defining an Nmap script – script headers
  • Triggering functions – the rule
  • Defining a script's action
  • Summary

Module 8: Additional Nmap Tools

  • Attacking services with Ncrack
  • Host detection with Nping
  • File transfers and backdoors with Ncat
  • Comparing Nmap results with Ndiff
  • Summary

Module 9: Vulnerability Assessments and Tools

  • Conducting vulnerability scans with Nessus
  • Assessing web server issues with Nikto
  • Identifying sensitive web directories with DirBuster
  • Getting started with intercepting proxies
  • Summary

Module 10: Penetration Testing with Metasploit

  • Installing Metasploit
  • Scanning with Metasploit
  • Attacking services with Metasploit
  • What to learn next
  • Summary
  • One year access to the class recording
  • Access to the lab environment during the training
  • Course material accessible in electronic format
  • One year subscription to the CodeRed platform containing thousands of cybersecurity videos
  • Certificate of attendance

Contact us for more information on pricing::

Office: 1-888-718-9732
E-mail: info@eccentrix.ca

130, King Street West, Suite 1800
Toronto, Ontario M5X 1E3