Companies Home Search Profile

Real NMAP : Elite Network Scanning & Recon in 10 Hours|CNMP+

Focused View

OCSALY Academy | 160.000+ Students

9:57:49

117 View
  • 1. What is network protocol and what it does.mp4
    04:15
  • 2. Layers of TCPIP Model.mp4
    04:10
  • 3. How emails sent and received over internet.mp4
    02:28
  • 4. PDU Explained.mp4
    06:18
  • 5. Basic Use of Switch and Data Transmission.mp4
    05:40
  • 6. 2 Networks Talking with Router in Middle.mp4
    04:49
  • 1. Introduction to Networking.mp4
    02:18
  • 2. What is Internetworking.mp4
    01:39
  • 3. Introduction to Area Networks.mp4
    02:42
  • 4. LAN.mp4
    01:35
  • 5. MAN.mp4
    01:07
  • 6. WAN.mp4
    02:17
  • 1. Introduction to Section and Fundamentals of Media Control Filtering.mp4
    04:50
  • 2. Linux WAP and Bypassing Mac Filtering.mp4
    06:27
  • 1.1 A1 - Resources.txt
  • 1. Creating our NmapEthical Hacking Lab.mp4
    02:39
  • 2. Getting Started.mp4
    07:42
  • 3. Installing Virtual Machines.mp4
    08:25
  • 4. Installing Kali.mp4
    07:24
  • 5. Installing Metasploitable.mp4
    07:49
  • 1. Understanding Linux Commands and Pipes.mp4
    07:24
  • 2. What is a Command.mp4
    03:31
  • 3. Pipeline example #1.mp4
    10:39
  • 4. Weird LS Command.mp4
    03:42
  • 5. Different Linux Commands using with Pipe.mp4
    11:22
  • 1. Understanding key concepts.mp4
    06:54
  • 2. Finding Helpful manuals.mp4
    06:51
  • 3. Linux Directories.mp4
    05:41
  • 4. Linux Directories - Part 2.mp4
    05:41
  • 1. The bridge between You and Shell.mp4
    07:27
  • 1. LS Command.mp4
    02:27
  • 2. RD vs APD.mp4
    09:05
  • 3. Filtering LS.mp4
    07:43
  • 4. CP Command.mp4
    06:36
  • 5. Tab Auto-completion.mp4
    03:31
  • 6. SYM AND HRD Link Files.mp4
    12:06
  • 7. Manipulating Files.mp4
    06:19
  • 1. Introduction to Shell and Expansion.mp4
    06:56
  • 2. Arithmetic Expressions with Shell.mp4
    04:16
  • 3. Automating Folder Creation with Shell.mp4
    08:16
  • 4. Quoting in Shell.mp4
    09:33
  • 1. Introduction to Permissions in Linux.mp4
    04:54
  • 2. Differences between UID, GID and Shadow.mp4
    06:18
  • 3. File and Dir Permissions.mp4
    08:30
  • 4.1 A4.txt
  • 4. Examples with File Permissions.mp4
    04:30
  • 5.1 A5.txt
  • 5. After this video youll understand all LINUX Permissions.mp4
    19:46
  • 6. Chmod.mp4
    12:45
  • 1.1 commands.txt
  • 1. Fundamentals of Processes in System.mp4
    06:55
  • 2. The Magic with PS Aux Command.mp4
    07:23
  • 3. The Magic with TOP Command.mp4
    08:12
  • 4. Foreground and Background Processes.mp4
    07:57
  • 5. From Background to Foreground.mp4
    04:20
  • 6.1 commands.txt
  • 6. Tutorial with Linux Process Signals.mp4
    11:33
  • 1. Introduction to Packet Management Systems.mp4
    04:43
  • 2. Why we need package management tools.mp4
    06:14
  • 3. Package Management in Linux - Final.mp4
    08:40
  • 1. Trcrt command.mp4
    08:25
  • 2. Networking with Linux.mp4
    07:12
  • 1. The main goal and importance of Network Security.mp4
    02:19
  • 2. 3 Main Ways to Make your Network Stronger.mp4
    04:36
  • 3. A Chain is no stronger than its weakest link.mp4
    02:44
  • 4. What is Network Maps in Cyber Security.mp4
    04:05
  • 1. Main Guidelines for Network Security.mp4
    05:54
  • 2. Analysis to Consider and Action Priority.mp4
    05:16
  • 3. Threat Modeling.mp4
    08:50
  • 1. Nmaps Network Scanning Capabilities.mp4
    07:07
  • 2. Beginning to Using NSE Scripts.mp4
    08:49
  • 3. Port scanning on Servers.mp4
    06:44
  • 4. Port scanning techniques and Interface Selection.mp4
    08:36
  • 5. Nmap Using Target List and Exclude List with CIDR.mp4
    15:52
  • 1. Nmap Operating System Detection.mp4
    10:13
  • 2. Random Port Scanning and Legal Issues.mp4
    06:46
  • 1. Unique Techniques that youll learn in this section.mp4
    09:00
  • 2. Advanced TCP ACK and SYN Scan.mp4
    12:29
  • 3. Advanced ICMP.mp4
    10:04
  • 1. Introduction to Reconnaissance.mp4
    08:22
  • 2. IP Geolocation and WhoIS using Nmap.mp4
    17:18
  • 3. Graphical Traceroute.mp4
    09:26
  • 1. Explanation and What Skills youll earn in this section.mp4
    09:42
  • 2. Scanning HTTP Methods and Potential Risks.mp4
    15:26
  • 3. Searching for Digital Gold in the Web Server Maze.mp4
    13:52
  • 1. What is Wireshark and What youll learn in this section.mp4
    01:40
  • 2. Introduction to Interface and Important Shortcuts.mp4
    10:44
  • 3. The Importance of promiscuous Mode.mp4
    04:37
  • 4. Displaying the Captured Data and Plugins.mp4
    08:27
  • Description


    Real Power of Nmap: Master Network Scanning, Reconnaissance and Exploit Discovery for Effective Penetration Testing|2023

    What You'll Learn?


    • Nmap's network scanning capabilities and how to use them effectively.
    • Utilizing NSE scripts to enhance scanning and exploit discovery.
    • Port scanning techniques and methodologies for servers.
    • Selecting the appropriate network interface for scanning tasks.
    • Targeting specific hosts or ranges using target and exclude lists with CIDR notation.
    • Operating system detection using Nmap.
    • Legal considerations and compliance when conducting random port scanning.
    • Unique techniques specific to Nmap for gaining an edge in scanning and reconnaissance.
    • Advanced TCP ACK and SYN scan techniques and their applications.
    • Leveraging ICMP for advanced scanning purposes.
    • The importance and fundamentals of reconnaissance in information gathering.
    • IP geolocation and WhoIS queries using Nmap.
    • Conducting graphical traceroutes for visualizing network communication paths.
    • Understanding the potential risks associated with different HTTP methods and scanning for them.
    • Searching for valuable information and potential vulnerabilities in web servers, aka "Digital Gold."
    • Understanding the basics of network protocols and their functions.
    • Exploring the layers of the TCP/IP model and their roles in network communication.
    • Learning the process of sending and receiving emails over the internet.
    • Understanding the concept of Protocol Data Units (PDU) and how they are used in networking.
    • Exploring the basic use of switches and data transmission in a network.
    • Learning how two networks communicate with each other using a router.
    • Getting an introduction to networking and its fundamental concepts.
    • Understanding the concept of internetworking and its importance in connecting networks.
    • Exploring different types of area networks (ANs) and their characteristics.
    • Learning about Local Area Networks (LANs) and their use in connecting devices within a limited area.
    • Understanding the concept of Metropolitan Area Networks (MANs) and their role in connecting cities or large areas.
    • Exploring Wide Area Networks (WANs) and their use in connecting geographically dispersed networks.
    • Introduction to sections and fundamentals of media control filtering in networking.
    • Exploring Linux Wireless Access Points (WAP) and bypassing MAC filtering techniques.
    • Creating a personal Nmap/Ethical Hacking laboratory for practical learning.
    • Getting started with networking concepts and tools.
    • Installing and setting up virtual machines for networking experiments.
    • Installing and configuring Kali Linux, a popular penetration testing distribution.
    • Installing Metasploitable, a vulnerable virtual machine for practicing security testing.
    • Understanding and using various Linux commands and pipes for efficient system management.
    • Exploring the concept of commands in Linux and how they are used to perform specific tasks.
    • Demonstrating examples of using pipelines in Linux for processing and manipulating data.
    • Exploring unusual LS (list) command options and their functionalities.
    • Learning and using different Linux commands in conjunction with pipes for advanced data processing.
    • Understanding key concepts related to Linux operating systems and their functionalities.
    • Finding and utilizing helpful manuals and documentation in the Linux environment.
    • Exploring Linux directories and their structure for effective file system navigation.
    • Continuing the exploration of Linux directories and their significance in organizing files and programs.
    • Understanding the shell and its role as an intermediary between the user and the Linux system.
    • Gaining knowledge about the fundamentals of processes in a Linux system and how they interact with the operating system.
    • and other awesome topics ---->>

    Who is this for?


  • Individuals new to network scanning and penetration testing who want to learn the basics of using Nmap.
  • IT professionals or system administrators who want to enhance their network scanning skills and gain a deeper understanding of Nmap's capabilities.
  • Cybersecurity enthusiasts or hobbyists who are interested in exploring the world of ethical hacking and want to start with a solid foundation in Nmap.
  • Students or learners in the field of cybersecurity or information technology who want to expand their knowledge and skills in network scanning and reconnaissance techniques.
  • What You Need to Know?


  • No programming experience required
  • More details


    Description

    Unlock the full potential of Nmap and become a master in network scanning, reconnaissance, and exploit discovery with our comprehensive course!

    In today's interconnected world, the ability to understand and secure computer networks is paramount. Nmap, the industry-standard network scanning tool, is a crucial skill for professionals in cybersecurity, network administration, and ethical hacking. Whether you are a beginner looking to learn the basics or an experienced practitioner seeking to refine your skills, this course is designed to take you on an exciting journey through the world of Nmap.

    Our course is thoughtfully crafted to provide you with the knowledge and practical skills needed to leverage Nmap effectively. You will start with the fundamentals, learning about Nmap's network scanning capabilities and how to conduct targeted scans to discover open ports, services, and potential vulnerabilities. You will explore the power of Nmap Scripting Engine (NSE) scripts, enabling you to automate and customize your scanning process for more efficient and accurate results.

    Delving deeper, you will gain insights into advanced techniques such as TCP ACK and SYN scans, ICMP scanning, and operating system detection. You will discover how to optimize your scanning methodology, select the appropriate network interfaces, and utilize target and exclude lists with CIDR notation for precise targeting. Moreover, you will delve into the legal aspects surrounding scanning, ensuring you are aware of the ethical considerations and compliant with relevant regulations.

    Reconnaissance, an essential aspect of penetration testing, will be a focal point of this course. You will learn how to perform IP geolocation, utilize WhoIS queries, and conduct graphical traceroutes to gain valuable insights into the target network's topology and potential attack vectors. Additionally, you will explore scanning HTTP methods, searching for potential risks, and uncovering hidden treasures within web servers.

    This course combines theoretical knowledge with hands-on exercises, allowing you to reinforce your understanding and apply your skills in real-world scenarios. With our interactive labs and practical demonstrations, you will gain the confidence to tackle network scanning challenges head-on.

    Whether you are an IT professional, aspiring ethical hacker, or cybersecurity enthusiast, this course is your gateway to mastering Nmap and becoming a skilled network scanning expert. Join us today and unlock the secrets of Nmap to fortify your network defenses and excel in your professional endeavors.

    Who this course is for:

    • Individuals new to network scanning and penetration testing who want to learn the basics of using Nmap.
    • IT professionals or system administrators who want to enhance their network scanning skills and gain a deeper understanding of Nmap's capabilities.
    • Cybersecurity enthusiasts or hobbyists who are interested in exploring the world of ethical hacking and want to start with a solid foundation in Nmap.
    • Students or learners in the field of cybersecurity or information technology who want to expand their knowledge and skills in network scanning and reconnaissance techniques.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    OCSALY Academy | 160.000+ Students
    OCSALY Academy | 160.000+ Students
    Instructor's Courses
    The OCSALY’s goal in the next three years, is to teach 2 million people new skills.Also OCSALY’s own courses, which are all available here, we are working with the very best instructors, creating courses to teach the essential skills required by developers, at all levels.One other important philosophy is that our courses are taught by real professionals; software developers, digital forensics investigators with real and substantial experience in the industry, who are also great teachers.  All our instructors are experienced, software developers!Our team is ONLINE creating new courses and answering your questions right now.Whether you are a beginner, looking to learn how to program for the very first time, or to brush up on your existing skills, or to learn new languages, frameworks or skills, the Academy has you covered all resources to learn from professional instructors !
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 84
    • duration 9:57:49
    • English subtitles has
    • Release Date 2023/07/31

    Courses related to CISSP - Certified Information Systems Security Professional

    Courses related to Ethical Hacking

    Courses related to Cyber Security

    Courses related to Network Security

    Courses related to Information Security

    Courses related to Cyber Security Awareness