November 20 2020

Getting Started in Port Scanning Using Nmap and Kali Linux

Getting Started in Port Scanning Using Nmap and Kali Linux
Getting Started in Port Scanning Using Nmap and Kali Linux
Genre: eLearning | MP4 | Video: h264, 1280x720 | Audio: aac, 44100 Hz
Language: English | VTT | Size: 920 MB | Duration: 2h 17m

What you'll learn
During this course you will learn to perform cyber security audits of your network using Kali Linux and nmap
You will be able to identify weaknesses in services and systems to mitigate against attack
You will learn to use Wireshark to capture packets on the network
You should have a good understanding of Linux from the command line
You should have some knowledge on networking
How Secure Is Your System?

A default install of CentOS 8 may seem like a good idea but how exposed does that leave you, after all it is Enterprise Level Linux.

In this course we work with nmap and Wireshark on Kali Linux from Offensive Security. Scanning your network with the tools and systems used by hackers helps you understand the cyber security risk to your systems. First, we identify one simple weakness with port 9090 open by default, in the firewall in readiness for Cockpit the web administration console. Cockpit is disabled by default leaving the system with one open port 22 and one closed port 9090 just what is needed for an effective Operating System detection scan. Simply closing 9090 in the firewall reduces this threat.

Next we learn to audit SSH security to detect systems that allow password based authentication, again a default setting we need to secure. The nmap Scripting Engine or NSE is perfect to delve inside of the services running on your system to expose weaknesses. Throughout the course, we use Wireshark to analyse the network activity helping you to understand the different modes of nmap.

Finally we secure the threats using Ansible configuration management; ensuring that the fixes are documented and repeatable.

The main topics covered in this course include:

Nmap as root and non-root accounts

The detection phases used by nmap

Host discovery using nmap

Creating lists of online hosts

Using different host discovery techniques in nmap

Using different port selection mechanisms in nmap

Using nmap and awk to list SSH Servers on the network

Capturing and filtering packets with Wireshark

Using NSE scripts to print SSH Host-keys and authentication methods

Using Ansible to secure your host configuration

Who this course is for:
Linux administrators looking to secure their systems
Security practitioners needing to learn more about network analysis

Feel free to post your Getting Started in Port Scanning Using Nmap and Kali Linux Free Download, torrent, subtitles, free download, quality, NFO, Uploadgig,, Nitroflare, Rapidgator, Filejoker, Filefox, Turbobit, Keep2Share,, 1fichier, Uptobox, Filefactory, Alfafile, Putlocker,, ClicknUpload, WatchTVSeries, Mixdrop, Streamtape, GoogleDrive Watch HD Movies Series Stream Online, free premium downloads movie, game, mp3 download, crack, serial, keygen, or whatever-related comments here. use only English, Owners of this website aren't responsible for content of comments.

Related News

Add comment

  • bowtiesmilelaughingblushsmileyrelaxedsmirk
Support Heroturko
You can support Heroturko by buying a Uploadgig account. %75 of your payment goes to Heroturko.

uploadgig allows you to download as a premium user at Unlimited Speed!
Donate via Bitcoin
Latest Releases
Recommended Filehosts