Scanning and Enumeration with NMAP

0
Level

Advanced

Language

Access

Paid

Certificate

Paid

NMAP is a powerful tool used by both attackers and defenders to scan networks. In this Scanning and Enumeration with NMAP course, Ken Underhill uses an NMAP lab to demonstrate the process for collecting information on a network using technical tools. Become a more advanced incident handler with this course.

Add your review

Course Description

In Scanning and Enumeration with NMAP, Ken Underhill gives an overview of scanning and the scanning methodology, which is the process of collecting information on a network using technical tools. Ken Underhill uses an Nmap lab to demonstrate this process. Nmap is a powerful tool used by both attackers and defenders to scan networks.

In Scanning and Enumeration with NMAP, Ken Underhill gives an overview of scanning and the scanning methodology, which is the process of collecting information on a network using technical tools. Ken Underhill uses an Nmap lab to demonstrate this process. Nmap is a powerful tool used by both attackers and defenders to scan networks.

Module 1: Scanning and Enumeration with NMAP

User Reviews

0.0 out of 5
0
0
0
0
0
Write a review

There are no reviews yet.

Be the first to review “Scanning and Enumeration with NMAP”

×

    Your Email (required)

    Report this page
    Scanning and Enumeration with NMAP
    Scanning and Enumeration with NMAP
    LiveTalent.org
    Logo
    Skip to content