Nmap — network mapping — could be considered the killer app of security workers today. It is used in various stages of the hacker life cycle, especially during the discovery stage. Pen testers, systems administrators and security analysts all use this application in various ways.
For the next Office Hours with James, join CompTIA Chief Technology Evangelist Dr. James Stanger to learn more about how nmap and other applications are used today, in both traditional and IoT networks.
James will get deep into how nmap works. He’ll discuss typical — and atypical — active nmap scans, as well as passive scanning techniques. James will also investigate additional discovery applications, including Metagoofil, Shodan, Metasploit, Censys and Maltego. He’ll also investigate how to coordinate the use of these tools. By the end of this presentation, you will have a strong understanding of the best practices and techniques used during the discovery stage of the hacker lifecycle.
Click Here to Watch the On-Demand Webinar
Webinar Details
What: Network Host Discovery with Nmap and Beyond
When: Anytime! Register to watch the webinar on-demand
How Long: 1 Hour
Continuing Education Units (CEUs): This webinar has been approved for 1 CEU for CompTIA A+, CompTIA Network+, CompTIA Security+, CompTIA Cloud+, CompTIA Linux+, CompTIA Cybersecurity Analyst (CySA+), CompTIA PenTest+ and CompTIA Advanced Security Practitioner (CASP+) certifications.