Webinar: Network Host Discovery with Nmap and Beyond

For the next Office Hours with James, join CompTIA Chief Technology Evangelist Dr. James Stanger to learn more about how Nmap and other applications are used today, in both traditional and IoT networks.
06811 Office Hours Banner July_515x325

 

Nmap — network mapping — could be considered the killer app of security workers today. It is used in various stages of the hacker life cycle, especially during the discovery stage. Pen testers, systems administrators and security analysts all use this application in various ways.

For the next Office Hours with James, join CompTIA Chief Technology Evangelist Dr. James Stanger to learn more about how nmap and other applications are used today, in both traditional and IoT networks.

James will get deep into how nmap works. He’ll discuss typical — and atypical — active nmap scans, as well as passive scanning techniques. James will also investigate additional discovery applications, including Metagoofil, Shodan, Metasploit, Censys and Maltego. He’ll also investigate how to coordinate the use of these tools. By the end of this presentation, you will have a strong understanding of the best practices and techniques used during the discovery stage of the hacker lifecycle.

Click Here to Watch the On-Demand Webinar

Webinar Details

What: Network Host Discovery with Nmap and Beyond

When: Anytime! Register to watch the webinar on-demand

How Long: 1 Hour

Continuing Education Units (CEUs): This webinar has been approved for 1 CEU for CompTIA A+CompTIA Network+, CompTIA Security+, CompTIA Cloud+, CompTIA Linux+, CompTIA Cybersecurity Analyst (CySA+), CompTIA PenTest+ and CompTIA Advanced Security Practitioner (CASP+) certifications. 

Click Here to Watch the On-Demand Webinar

Email us at blogeditor@comptia.org for inquiries related to contributed articles, link building and other web content needs.

Read More from the CompTIA Blog

Leave a Comment