From the course: Security Testing: Nmap Security Scanning
Unlock this course with a free trial
Join today to access over 25,500 courses taught by industry experts.
Network scanning - Nmap Tutorial
From the course: Security Testing: Nmap Security Scanning
Network scanning
- [Instructor] Cybersecurity analysts can only secure a network when they have good situational awareness of the systems and devices on that network. With dozens of new devices appearing on the networks of large organizations every day, keeping tabs on network topology is quite difficult without specialized tools. Network mapping is the practice of scanning networks, looking for systems that are willing to respond to a variety of connection types. This is, by nature, an imperfect activity, because many systems are configured to ignore unsolicited connection attempts. However, it does provide an important glimpse at network activity, especially when you combine it with other information. Network mapping is particularly useful at performing rogue system detection. Nmap, short for network mapper, is the most common network mapping tool. It's a free download available from nmap.org and it's in the toolkit of pretty much…