Learn to code from scratch with the latest and greatest tools and techniques.
Enroll NowFrom Photoshop to After Effects, learn professional creative tools from the experts.
Enroll NowSnag unlimited access to 1,000+ courses for life — now just $99 with this deal!
View DealWelcome to the Complete Nmap Course!
Nmap is the Internets most popular network scanner with advanced features than most people don't even know exist!
Discover the secrets of ethical hacking and network discovery, using Nmap on this complete course.
Nmap is an indispensable tool that all techies should know well. It is used by all good ethical hackers, penetration testers, systems administrators, and anyone in fact who wants to discovery more about the security of a network and its hosts.
You cannot be a good ethical hacker or systems administrator without being an expert in Nmap.
You will go from beginner to expert in easy to follow structured steps - and we cover all major platforms that Nmap can be used on, including - Windows, Mac, Linux and Kali.
The ideal student for this course is technically minded with an interest in ethical hacking and network security.
At the end of this course you'll have a practical skill-set in using Nmap to scan networks. You will be able to find vulnerabilities and weaknesses on systems that can be exploited by hackers.
I have over 24 years experience in cyber security where I have advised some of largest companies in the world, assuring security on multi-million and multi-billion pound projects. I am the CEO of Station X a cyber security consultancy. More recently I acted as the lead security consultant on a number of the UKs mobile banking and payment solutions helping secure to date over £71Bn in transactions.
My clients have included; BP, ExxonMobil, Shell, Vodafone, VISA,
T-mobile, GSK, COOP Banking Group, Royal Bank of Scotland, Natwest,
Yorkshire bank, BG Group, BT, London 2012.
Over the years I
have spoken at a number of security conferences, developed free
security tools, and discovered serious security vulnerabilities in
leading applications.
Qualifications and education
★ BSc. (Hons) Computing 'Networks & Communication' 1st Class Honors
★ SCF : SABSA Charted Architect Foundation
★ CISSP : Certified Information Systems Security Professional
★ CISA : Certified Information Systems Auditor
★ CISM : Certified Information Security Manager
★ ISO 27001 Certified ISMS Lead Auditor
★ CEH : Certified Ethical Hacker
★ OSCP : Offensive Security Certified Professional