Nmap for Penetration Testing: From Beginner to Advanced

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Nmap for Penetration Testing: From Beginner to Advanced

Coursera · Beginner ·🔐 Cybersecurity ·1mo ago
Updated in May 2025. This course now features Coursera Coach! A smarter way to learn with interactive, real-time conversations that help you test your knowledge, challenge assumptions, and deepen your understanding as you progress through the course. In this comprehensive course, you will embark on a journey through the fundamentals and advanced techniques of Nmap, a critical tool for network scanning and penetration testing. Starting with an introduction and the setup of your working environment, you'll quickly move into compiling Nmap from source and understanding its significance in network scanning. This course is meticulously updated for 2021, ensuring you are equipped with the latest knowledge and techniques. As you progress, you'll delve into networking fundamentals, exploring port scanning, the OSI model, and the intricacies of the network and transport layers. The course then guides you through host discovery methods, including various ping scans and traceroute techniques, ensuring a robust understanding of how to identify live hosts on a network. Each module builds on the last, with a dedicated section on advanced scanning techniques where you’ll learn about different scan types, operating system detection, and aggressive scanning strategies. The final sections cover essential skills for penetration testers, including firewall detection and evasion, scan timing, performance optimization, and the Nmap Scripting Engine (NSE). Service enumeration modules will provide hands-on experience in identifying and analyzing various network services, enhancing your capability to detect vulnerabilities and assess network security comprehensively. By the end of this course, you will have a deep and practical understanding of Nmap, positioning you as an adept network security professional. This course is designed for cybersecurity professionals, network administrators, and IT enthusiasts who want to deepen their knowledge of network scanning and penetration testing
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

Stop Blindly Disabling CSRF — Dynamic CSRF Configuration in Spring Security 6
Learn to dynamically configure CSRF protection in Spring Security 6 for hybrid enterprise APIs, replacing global disable strategies
Medium · Cybersecurity
The OpenAI Breach Wasn't About OpenAI – It Was About the 84 Packages Above Them
The OpenAI breach highlights the importance of securing dependencies in the software supply chain, affecting 84 packages above them
Dev.to · Dimitris Kyrkos
Years of Apple's Best Security Work, Cracked in Five Days — Here's What Developers Should Know
Apple's best security measures were cracked in five days, highlighting the importance of ongoing security efforts for developers
Dev.to · ArshTechPro
TorCT PHP RAT 2026
Learn about TorCT PHP RAT, a stealthy Remote Access Trojan written in PHP that operates without port forwarding, and understand its implications for cybersecurity.
Dev.to AI
Up next
Cryptography
Coursera
Watch →