Introduction
  • Introduction to instructor (BIO)
  • Target Audience
  • What is Nmap
  • Goals and Learning Objectives
  • Cyber Security and Ethical Hacking Careers
Cheat Sheet
  • Nmap Cheat Sheet
Installing Nmap and Cloud Labs
  • Goals and Learning Objectives
  • How to Install Nmap
  • Cloud Based Hacking Lab
Nmap Basics, Target Specification & Port States
  • Goals and Learning Objectives
  • An Introduction to Port Scanning and Fingerprinting
  • Nmap Basics
  • Nmap Target Specification
  • Nmap Port states
Nmap Discovery and Ping Scanning
  • Goals and Learning Objectives
  • Nmap Discovery - Part 1
  • Nmap Discovery - Part 2
  • Nmap Discovery - Part 3
  • Nmap Discovery - Part 4
Nmap Scan Techniques
  • Goals and Learning Objectives
  • Nmap Scan Techniques - SYN and Connect
  • Nmap Scan Techniques - UDP and SCTP
  • Nmap Scan Techniques - TCP ACK and Window
  • Nmap Scan Techniques - NULL, FIN, Xmas, Maimon Idle Scan and IP Protocol
Nmap Port Specification, Service, Version & OS Detection
  • Goals and Learning Objectives
  • Nmap Port Specification
  • Nmap Service and Version Detection
  • Nmap OS Detection
Nmap Scripting Engine (NSE)
  • Goals and Learning Objectives
  • Nmap Scripting Engine (NSE) Part 1 - Categories
  • Nmap Scripting Engine (NSE) Part 2 - Usage and Cool Scripts
  • Nmap Scripting Engine (NSE) Part 3 - Usage and Cool Scripts
  • Nmap Scripting Engine (NSE) Part 4 - Usage and Cool Scripts
  • Writing Nmap Scripting Engine (NSE) Scripts
Nmap Performance, Firewall and IDS Evasion
  • Goals and Learning Objectives
  • Nmap Timing and Performance
  • Nmap Firewall / IDS Evasion and Spoofing Part 1
  • Nmap Firewall / IDS Evasion and Spoofing Part 2
Nmap Output and Extras
  • Goals and Learning Objectives
  • Nmap Output
  • Nmap Output & Miscellaneous Options
  • Extras
Zenmap
  • Goals and Learning Objectives
  • How to Use Zenmap - Nmap GUI
  • Zenmap Built-in Profiles
  • How to use the Zenmap Profile Editor
How Criminal Black Hats Use Nmap with Hacking Infrastructures
  • Goals and Learning Objectives
  • Command and Control (C&C) Hacking Infrastructure
Wrap up
  • Certificate of Completion
  • Congratulations
Preview Lectures
  • Preview Introduction
  • Password cracking part 1
  • Password cracking part 2
  • Bypassing firewalls and HTTP proxies part 3
  • Choosing an E-Mail provider
  • Router Vulnerability Scanning (Shodan, Qualys)
BONUS
  • BONUS - How to Start a Career in Cyber Security