Main Menu

 Home 

 Software 
    - Driver 
    - Graphic & Design 
    - Internet 
    - MacOSX 
    - Multimedia 
    - Office 
    - Portable 
    - Security 
    - System 

 Music 
    - Mp3 
    - Music Video 

 Games 
    - PC 
    - Console 

 Books 
    - Audiobook 
    - Comic 
    - eBook 
    - Magazine 
    - Video Training 

 Movies 
    - Amine 
    - Cam 
    - DVD 
    - HD/BluRay 
    - TV Show 
    - Documentary 

 Graphics 
    - 3D Model 
    - icon 
    - Font 
    - Footage 
    - Photoshop 
    - Template 
    - Vector 
    - Stock 
    - Script/Plugin 
    - Wallpaper 

 Mobile 
    - iOS 
    - Android 
 
 
 
   Books / Video Training : Hands-On Network Scanning with Nmap for Network Security
Hands-On Network Scanning with Nmap for Network  Security


Hands-On Network Scanning with Nmap for Network Security
.MP4, AVC, 1920x1080, 30 fps | English, AAC, 2 Ch | 2h 59m | 565 MB
Instructor: Brian Rogalski


Audit and analyze your network security with Nmap

Learn

Learn how to perform internal network scans to audit and secure your network
Understand how to use Nmap to perform network scanning with basic and advanced options
Get familiar with host discovery and advanced Nmap scanning options to emulate attacks
Create custom reports and inventories facilitated by Nmap scanning
Automate features and tasks of Nmap using the scripting engine
Get familiar with firewall and intrusion detection system (IDS) evasion techniques and Zenmap

About

Do you want to enhance your organization's network security? Are you worried about what could happen if an intruder were to move laterally throughout your network? Internal network security testing is a critical aspect of any security program, while not knowing if an attacker has successfully identified a flaw that has led to a breach could be disastrous.

In this course, you will learn about several modules to use Nmap in real life situations, discovering vulnerabilities, and emulate an attack on a system. You will start with a review of penetration testing processes, installing Nmap, types of available scans, and the reasons for selecting different Nmap scanning options. Next, you will learn about advanced scanning with Nmap and customize scans to analyze machines, servers, and networking devices. You will then create Nmap reports and customize formatting options for detailed information about the network. You will automate useful activities using the Nmap scripting engine. You will also learn about Firewall and IDS evasion and Zenmap GUI.

By the end of this course, you will be able to confidently audit your network with Nmap and scan through vulnerabilities to secure your network.

Features

Understand the power of Nmap to discover vulnerabilities, emulate intruder attacks, and secure internal resources
Your preparation guide to performing internal network security audits
Utilize Zenmap to perform Nmap scanning and use the Nmap scripting engine to automate tasks

Download link:

rapidgator_net:
https://rapidgator.net/file/8c26da6e180c096ddccedf8af9ca420a/ly70g.HandsOn.Network.Scanning.with.Nmap.for.Network.Security.rar.html

nitroflare_com:
https://nitroflare.com/view/A387A86823C5075/ly70g.HandsOn.Network.Scanning.with.Nmap.for.Network.Security.rar

uploadgig_com:
http://uploadgig.com/file/download/dFdba0F97C89775E/ly70g.HandsOn.Network.Scanning.with.Nmap.for.Network.Security.rar


Links are Interchangeable - No Password - Single Extraction
 

 

Back to Top