Vulnerability Scanning with Nmap: Network Scanning

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Vulnerability Scanning with Nmap: Network Scanning

Coursera · Beginner ·🔐 Cybersecurity ·1mo ago
The Vulnerability Scanning with Nmap: Network Scanning guided project dives into the use of the Nmap tool, a popular free and open-source tool used for network scanning and security auditing. This project covers how to verify the installation of Nmap and the Nmap version on a system, as well as the basics of network scanning, host discovery, port scanning, service enumeration, operating system detection, version detection, and vulnerability detection using the Nmap tool. We’ll cover practical steps for network scanning that can be used to showcase your skills to a current or future employer. Security professionals, such as Security Analysts or Security Engineers, use Nmap to improve the security of their networks and to identify potential vulnerabilities before they can be exploited by attackers. By completing this project, learners will gain hands-on experience running various Nmap commands in the terminal to perform basic scanning on a target to identify potential vulnerabilities on a network which is helpful to improve network security. A basic knowledge of vulnerability scanning and an understanding of networking concepts, such as IP addresses, ports, and protocols, is recommended.
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

The Hidden Risk in Emergency Evacuation Plans Nobody Talks About
Organizations struggle to identify who is inside their buildings during emergencies, posing a hidden risk in evacuation plans
Medium · Cybersecurity
3 Key Takeaways on Why Cybersecurity Product Management Matters More Than Ever
Cybersecurity product management is crucial for building trust in digital products, learn how to prioritize security in product design
Medium · Cybersecurity
The Coding Challenge That Came for Your development Directory: Anatomy of a Job Interview Infostealer
Learn to identify and protect against malicious coding challenges that can steal sensitive information from your development directory
Dev.to · Alex Chen
I Watched an AI Hack a Home Network in Under 10 Minutes
Learn how AI hacking tools can break into home routers in under 10 minutes and why cybersecurity is crucial
Medium · Cybersecurity
Up next
How do I delete recovery points under a legal hold or in a locked backup vault for AWS Backup?
Amazon Web Services
Watch →