Best Free NMAP Courses

Find the best online Free NMAP Courses for you. The courses are sorted based on popularity and user ratings. We do not allow paid placements in any of our rankings.

Nmap – Beginners Course

Know your network vulnerabilities using the Nmap tool. fast and easy !

Created by Ofer Shmueli - Wi-Fi and Security Specialist

"]

Students: 6598, Price: Free

THE COMPLETE GUIDE TO RECONNAISSANCE WITH Nmap

The goal of this course is to help you learn the basic fundamentals of reconnaissance for ethical hacking.

The art of Nmap reconnaissance  is the most fundamental tool for every ethical hacker

This course will help you  to become a better ethical hacker.

SEE WHAT STUDENTS ARE SAYING

Elihay Nagar

"Perfect course and excellent explanation :) i cannot ask more then that"

Kelly Mor

"very well made. delivers the content in an engaging way. very good course !!! I actually started playing with nmap in my work"

Jhonatan Pierce

"Excellent course , i loved the phase , the explanations "

Irfan Neox

This course was really helpful with the things that I wanted to know and the instructor actually got real to the point and match everything that I really wanted this type of course.

Farafan Leno

This is an amazing course for anyone wanting to understand and learn about nmap.

Babel song

Very clear, robust information. Easy to understand, practice-oriented.

WHY Nmap ?

Nmap is the world's most famous ( for a good reason ) network scanner

In this course you will learn to craft your own Probes with customised  TCP and ICMP packets

This course is HANDS ON . no power points or fancy words .

if you are interested in pen testing and want to learn the art of reconnaissance , then you have come to the right place

WHAT WILL YOU LEARN

When you master Nmap, you also master network protocols and TCP-IP

  • here You will learn of major network protocols : UPNP, DHCP, SMB, HTTP, DNS  and how to use their weaknesses and discover valuable information on the network you wish to pen test

  • Craft your own TCP and ICMP Probes

  • discover hosts on the network

  • scan for open, closed, filtered and unfiltered ports

  • Understand how Nmap works behind the scenes

  • Evade FW

  • Practice the best discovery Nmap Scripts

TARGET AUDIENCE

  • students who have little or no experience in penetration testing.

  • anyone who is interested in ethical hacking and wants to become one

Ethical Hacking with Nmap and Metasploit Framework Part-2

Learn to conduct vulnerability assessment with Nmap and penetration testing Metasploit

Created by Rajneesh Gupta - Cyber Security Practitioner and Instructor

"]

Students: 4700, Price: Free

Learn to conduct vulnerability assessment with Nmap and penetration testing Metasploit framework.

Nmap ("Network Mapper") is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.

The Metasploit Project was undertaken in 2003 by H.D. Moore for use as a Perl-based portable network tool, with assistance from core developer Matt Miller. It was fully converted to Ruby by 2007, and the license was acquired by Rapid7 in 2009, where it remains as part of the Boston-based company’s repertoire of IDS signature development and targeted remote exploit, fuzzing, anti-forensic, and evasion tools.

Security Testing Nmap Security

Security Testing Nmap Security

Created by Sulaiman Siddiqi - 8+ years of previous experience follow up SDLC and ITIL

"]

Students: 2408, Price: Free

•This course is designed for students who are completely new to Nmap. You don't need any prior experience running network scans or performing cybersecurity assessments. We'll walk through everything you need to know.

•Even how to install the Nmap scanner on your system. You should have a basic familiarity with system administration.

•Another topic that's closely related to Nmap scanning is firewall administration.

•You won't need to understand firewalls deeply to be successful in this course, but you will likely need to use firewalls to correct some of the issues that you discover during Nmap scans.

  • Network mapping: Nmap can identify the devices on a network (also called host discovery), including servers, routers, and switches, and how they're physically connected.

  • OS detection: Nmap can detect the operating systems running on network devices (also called OS fingerprinting), providing the vendor name, the underlying operating system, the version of the software, and even an estimate of devices' uptime.

  • Service discovery: Nmap can not only identify hosts on the network, but whether they're acting as mail, web, or name servers, and the particular applications and versions of the related software they're running.

  • Security auditing: Figuring out what versions of operating systems and applications are running on network hosts lets network managers determine their vulnerability to specific flaws. If a network admin receives an alert about a vulnerability in a particular version of an application, for example, she can scan her network to identify whether that software version is running on the network and take steps to patch or update the relevant hosts. Scripts can also automate tasks such as detecting specific vulnerabilities.