Ethical Hacking with Zenmap: Essential Network Scanning Techniques for Ethical Hackers
This course is aimed at intermediate and advance practitioners, and provides a comprehensive overview of one of the key phases in ethical hacking: network scanning, which is essential for gathering information about a target, such as a website or an organization’s network. The course specifically focuses on Zenmap, the graphical user interface (GUI) version of Nmap, a powerful network scanning tool.
During this course, learners will gain a deep understanding of Zenmap’s features and learn how to apply them in practical situations. They will explore how Zenmap operates within the OSI model, and gain the skills to set up and launch their own network scanning lab. Additionally, learners will analyze and apply various host discovery methods, port scanning techniques, and Zenmap’s timing and scripting functionalities in real-world scenarios. This course equips learners with the knowledge and skills needed to effectively use Zenmap for network scanning tasks in ethical hacking.
Content
- Introduction to Zenmap and launching scanning networks lab
- Analysis of Zenmap host discovery
- Analysis of Zenmap port scanning
- Analysis of timing and scripting in Zenmap
Learning Outcomes
Upon completing this course, learners will be able to:
- Understand the features of Zenmap and apply them in practical scenarios.
- Analyze how Zenmap operates within the OSI model
- Set up their own network scanning lab.
- Explore and apply various host discovery methods in real-world scenarios by analyzing how Zenmap performs host discovery.
- Investigate and utilize different port scanning techniques in real-world applications by understanding how Zenmap conducts port scanning.
- Examine how Zenmap handles timing and scripting, and learn to apply scripting in practical scenarios.
Training Method
We use PowerPoint slides to teach the theoretical concepts of network scanning, while also setting up a lab to provide hands-on experience. This combination helps students not only learn the theory but also apply it in real-world scenarios.
Organised By
Digital Learning Hub Luxembourg
Certification
Participation OnlyPrerequisites
Operating system, familiar with OSI model, familiar with IP, TCP, UDP, ICMP protocols, familiar with IP addresses and ports in computer networks, interest in analysing the details of network protocols.
Planning and location
18:00 - 21:00
18:00 - 21:00
18:00 - 21:00
18:00 - 21:00
18:00 - 21:00
ESCO Skills
ESCO Occupations
Your trainer(s) for this course
