Getting Started in Port Scanning Using Nmap and Kali Linux

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Getting Started in Port Scanning Using Nmap and Kali Linux

Coursera · Beginner ·🔐 Cybersecurity ·1mo ago
Updated in May 2025. This course now features Coursera Coach! A smarter way to learn with interactive, real-time conversations that help you test your knowledge, challenge assumptions, and deepen your understanding as you progress through the course. Delve into the world of network security with a practical approach to port scanning using Nmap and Kali Linux. The course begins by introducing you to the powerful toolset of Kali Linux and the fundamentals of Nmap, enabling you to understand and execute various network security operations. You will explore how to use Nmap for versioning, scanning, and working with complementary tools like Wireshark, setting the groundwork for more advanced techniques. As you progress, the course covers host discovery methods using Nmap, highlighting the differences in functionality between standard and root users. You will gain hands-on experience with host lists, learn to optimize scans for specific needs, and understand the intricate details of port selection and output interpretation. By the end of this section, you will be proficient in selecting and configuring different scan types to get the most out of Nmap’s capabilities. The final part of the course focuses on protecting your system using Ansible in conjunction with Kali Linux. You will learn configuration management to secure your servers, automate firewall setups, and protect SSH servers. The course concludes with a comprehensive summary, reinforcing your newfound skills and preparing you for practical application in real-world scenarios. This course is designed for aspiring cybersecurity professionals, network administrators, and IT enthusiasts looking to gain practical experience in port scanning and network security. A basic understanding of networking concepts and Linux is recommended, including familiarity with IP addressing, subnetting, and command-line operations. No prior experience with Nmap or Kali Linux is required, making this course accessible to beginne
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

Stop trusting your agent skills with vibes. Eliminate the context security risk.
Learn to eliminate context security risks by using specific tools to audit package installations, rather than relying on intuition
Dev.to · Tessl
Investigating a Command Injection Attack — SOC168: Whoami Command Detected in Request Body |…
Learn to investigate Command Injection attacks using a real-world example on the LetsDefend SOC platform
Medium · Cybersecurity
pwning Facts
Learn to analyze nmap scan results to identify open ports and potential vulnerabilities in a system
Medium · Cybersecurity
From the Perspective of a 20-Year Architect: My Own System's Security
A 20-year architect shares his experience with a security incident on his own system, highlighting the importance of security awareness and proactive measures
Dev.to · Mustafa ERBAY
Up next
Cryptography
Coursera
Watch →