Curriculum

  1. 1

    Book Preview

    1. Ultimate Penetration Testing with Nmap Free preview
  2. 2

    Introduction

    1. (Included in full purchase)
  3. 3

    Chapter 1 : Introduction to Nmap and Security Assessments

    1. (Included in full purchase)
  4. 4

    Chapter 2 : Setting Up a Lab Environment For Nmap

    1. (Included in full purchase)
  5. 5

    Chapter 3 : Introduction to Attack Surface Mapping

    1. (Included in full purchase)
  6. 6

    Chapter 4 : Identifying Vulnerabilities Through Reconnaissance and Enumeration

    1. (Included in full purchase)
  7. 7

    Chapter 5 : Mapping a Large Environment

    1. (Included in full purchase)
  8. 8

    Chapter 6 : Leveraging Zenmap and Legion

    1. (Included in full purchase)
  9. 9

    Chapter 7 : Advanced Obfuscation and Firewall Evasion Techniques

    1. (Included in full purchase)
  10. 10

    Chapter 8 : Leveraging the Nmap Scripting Engine

    1. (Included in full purchase)
  11. 11

    Chapter 9 : Best Practices and Considerations

    1. (Included in full purchase)
  12. 12

    APPENDIX A

    1. (Included in full purchase)
  13. 13

    APPENDIX B

    1. (Included in full purchase)
  14. 14

    Index

    1. (Included in full purchase)

About the course

This essential handbook offers a systematic journey through the intricacies of Nmap, providing both novice and seasoned professionals with the tools and techniques needed to conduct thorough security assessments with confidence. The purpose of this book is to educate and empower cyber security professionals to increase their skill set, and by extension, contribute positively to the cyber security posture of organizations through the use of Nmap. This book starts at the ground floor by establishing a baseline understanding of what Penetration Testing is, how it is similar but distinct from other types of security engagements, and just how powerful of a tool Nmap can be to include in a pen tester’s arsenal. By systematically building the reader's proficiency through thought-provoking case studies, guided hands-on challenges, and robust discussions about how and why to employ different techniques, the reader will finish each chapter with new tangible skills. With practical best practices and considerations, you'll learn how to optimize your Nmap scans while minimizing risks and false positives. At the end, you will be able to test your knowledge with Nmap practice questions and utilize the quick reference guide for easy access to essential commands and functions.

About the Author

Travis DeForge is the Manager of Cybersecurity Engineering at Gotham Security, a US-based boutique cybersecurity firm that provides high-quality penetration testing, malicious adversary simulation, threat intelligence, and cybersecurity strategy services. In this role, Travis routinely conducts network and web application penetration tests, social engineering engagements, and cloud security assessments for multibillion-dollar global organizations. Travis holds a Bachelor of Arts from the University of Vermont in Mandarin Chinese and a Master of Science from Western Governors University in Information Technology Management as well as numerous certifications in networking, project management, cyber security, cloud computing, and information technology including CompTIA SecuritY+, Network+, Pentest+ and Lean Six Sigma Blackbelt.