Getting Started in Port Scanning Using Nmap and Kali Linux

Kali Linux is one of the popular tools used for penetration testing, ethical hacking, and network security assessments. This course will help you to explore the techniques of port scanning using Nmap and Kali Linux.
The course starts by introducing you to the course objectives and to Kali Linux and Nmap. Next, you will delve into the concepts of host discovery, creating Nmap host lists in Kali Linux on the way. Moving ahead, you will learn the techniques used to perform scans with Nmap and learn the process of auditing Secure Shell (SSH) security to detect systems that allow password-based authentication. Toward the end, you will learn to use Ansible to secure the threats, ensuring that the fixes are documented are repeatable. Throughout this course, you will use Wireshark to analyze the network activity, which will help you to understand the different nodes of Nmap with ease.
By the end of this course, you will have gained all the essential skills needed to perform cybersecurity audits of your network using Kali Linux and Nmap.

Type
video
publication date
2020-11-26
what you will learn

Scan the local CentOS 8 host both with and without a firewall
Distinguish between Transmission Control Protocol (TCP) and SYN scan
Use Nmap and awk to list Secure Shell (SSH) servers on the network
Capture and filter packets with Wireshark
Print Secure Shell (SSH) host-keys with Nmap Scripting Engine (NSE) scripts
Secure your host configuration with Ansible

duration
139
key features
Learn how to tackle common network security threats with Kali Linux and Nmap * Understand different port selection mechanisms of Nmap * Understand Ansible configuration management and implement it in a real-world scenario
approach
With the help of examples and activities, this course will help you to develop Kali Linux and Nmap skills that are required to defend a network system against potential security threats.
audience
If you are a Linux administrator or a security practitioner who is looking to secure network systems using Kali Linux and Nmap, this course is for you. To learn from this course, you should have a good understanding of Linux—from command line to basic networking skills.
meta description
Discover top-class methods to identify weaknesses in services and systems to mitigate against network attacks
short description
This course focuses on Kali Linux and Nmap, which every network administrator needs to know. You will also learn the best practices to scan your networks for weaknesses and learn some excellent techniques to defend the security threats.
subtitle
Proven tactics to reduce cybersecurity threats
keywords
Kali Linux, Nmap, Ansible, Cybersecurity, Network Security, Wireshark, Host Discovery
Product ISBN
9781801078696