Nmap is know the world over and has even been featured inย numerous movies. So, Nmap itself should need no introduction. But where does it fit in your day-to-day toolset as a pentester? This Free Upskill Challenge (UC) is the first of many in JHTโs new series on Pentesting for the Masses, where we will explore numerous tools used throughout an actual engagement.
This UC offers a ground-up introduction to network discovery with Nmap. Youโll learn not just what Nmap does, but why its results matter, how protocols like TCP, UDP, and ICMP shape discovery, how ports map services to the network and how different scan techniques reveal what a host is actually exposing.
Weโll unpack Nmapโs core functionality and its many options such as host discovery, targeted TCP/UDP scanning, version and OS detection and the Nmap Scripting Engine (NSE). Rather than a laundry list of flags, we will implement a workflow you can immediately apply: discover -> targeted scanning -> version/OS enumeration -> selective NSE use. Along the way youโll get examples, interpretation, and tips picked up over the years.
Price = FREE!
Whatโs an Upskill Challenge (UC)?
A UC is a CTF-style, bite-sized lesson from the JHT Team, our courseware developers as well as โfriendsโ of JHT. They are meant to be short and to the point. UCs focus on a single tool or concept and are helpful in quickly providing useful skills that might be prerequisites for other types of educational content on the platform.
A UC should be 10 โ 30 minutes of student time and have no VMs. There are quizzes to make sure that the content is understood.
Prerequisites for UC – Nmap
UCs assume no knowledge at all! Theyโre meant to be completely self-contained, so all of the answers are in the lesson. No outside research is required.
