Advanced NMAP Training Course

Discover the secrets of ethical hacking and network discovery, using Nmap, with this advanced & intensive training course

We have trained over 750 organizations including:

A comprehensive course covering all aspects of Nmap - from the most basic to the more advanced

14 practical, hands-on lab sessions and 23 theory sessions leading to in-depth learning

Created by experts to help you achieve an advanced level of understanding of this powerful tool

Upskill yourself in vulnerability assessment and pentesting testing with this Advanced course

Nmap is the most popular network scanner and is widely used in vulnerability assessment and penetration testing. Nmap has advanced features which should also be considered during security assessments.

Nmap is not only used for port scanning but also finding out other details like operating systems detection, vulnerability discovery and much more. Find out all about the advanced features and uses of Nmap with this comprehensive course. Unlock your true potential as a security professional and upskill yourself in one of the most powerful vulnerability assessment tools today. 

Benefits of the Advanced Nmap Training Course

  • Learn all about scanning networks, finding various hosts and services.

  • Gain in-depth knowledge of Nmap scripting engine and how to use the Nmap scripts during vulnerability assessments.

  • Understand how to harness the true benefits of this flexible, powerful and easy-to-use tool. 

  • Enhance your skills as a pentester and improve your employability in the lucrative field of cybersecurity. 

NMAP (1)

 

Advanced Nmap Course Learning Objectives:

After having completed this course, you will be able to: 

  • Understand and explain the basics of Nmap, who created the tool and what its benefits are.

  • Know how to install Nmap for different Operating Systems. 

  • Understand basic Scans and how routers, firewalls etc. can skew the results of an Nmap scan.

  • Figure out how to scan single and multiple targets using Nmap.

  • Understand the Nmap Aggressive mode and how it can provide additional information about each open port compared to regular scan types.

  • Enhance your knowledge of advanced scanning options in Nmap such as TCP Scanning, UDP Scan, IP Protocol Scan, SYN Health Scan etc.

  • Work with Nmap Timing Options and use them to slow down or speed up the scan depending on your requirements.

  • Improve your knowledge of Nmap output format options and how they can be of use to you when scanning a large network.

  • Explain what Zenmap is and how to use it.

  • Articulate what the Nmap Scripting Engine is and how to unlock its potential.  

Feedback and Testimonials for our Courses

The playbooks training course was a good 'part-2' to the CIPR and went into greater depth in a number of areas. The day was fun and Amar kept us moving along at a good pace.
Kevin Hayes
CISO, Cyber Risk Associates

Enjoyed the course. Good mix of attendees and plenty of lively conversation. Amar steered us through it all admirably.

Russ Smith
CISO, EOL IT

Overall the course was very good. I would strongly recommend this training to anyone who is involved in Cyber Security or has control of information assets.

Kim Rose
Information Governance Officer, Wye Valley NHS Trust

It was a great workshop with a lot of interesting people and a great learning experience.

Philipp Scheiwiler
System Engineer
This was a very helpful day and opportunity to speak with a number of operational incident responders to discuss what really works in practice and not just in theory. I gained a great deal from the day, particularly around the construction of bespoke playbooks and also a variety of useful resources to inform my learning. A really good day.
Andrew Lock
Information Security Consultant

Advanced Nmap Training Course Modules 

Module 1 - Introduction
  • Introduction to Nmap. Installation.

  • Basic Scan and Warning.

  • Syntax and Default Options. 
Module 2 - Basic Scans
  • Basic Scans.

  • Aggressive Scans. 
Module 3 - Advanced Scanning Options
  • TCP Connect. SYN Stealth.

  • UDP Scan. Ping Scan. 

  • Version. OS Fingerprinting. Fast.

  • Verbose. Fin, Null, Xmas. 

  • Ack. Idle. Decoy. 

  • Fragment.  
Module 4 - Timing Options
  • Timing Option. 
Module 5 - Output Options
  • Output Forms. 
Module 6 - ZenMap
  • ZenMap. 
Module 7 - Nmap Scripting
  • NSE. 

All trademarks, service marks, trade names, product names, service names and logos appearing on the site, or on printed or digital material are the property of their respective owners, including in Cyber Management Alliance Ltd. Any rights not expressly granted herein are reserved.

Building and Optimising Incident Response Playbooks

Find out more about our one day public courses or internal workshops, please complete the form below. 

  • callOr call us on:
  • +44 (0) 203 189 1422