Nmap — network mapping — could be considered the killer app of security workers today. It is used in various stages of the hacker life cycle, especially during the discovery stage. Pen testers, systems administrators and security analysts all use this application in various ways.
For the next Office Hours with James, join CompTIA Chief Technology Evangelist Dr. James Stanger to learn more about how nmap and other applications are used today, in both traditional and IoT networks.
James will get deep into how nmap works. He’ll discuss typical — and atypical — active nmap scans, as well as passive scanning techniques. James will also investigate additional discovery applications, including Metagoofil, Shodan, Metasploit, Censys and Maltego. He’ll also investigate how to coordinate the use of these tools. By the end of this presentation, you will have a strong understanding of the best practices and techniques used during the discovery stage of the hacker lifecycle.
Click Here to Register for the Webinar