Nmap:
This course begins with a straightforward guide to installing Nmap, ensuring that you have the software ready to use. Next, we cover the fundamentals of Nmap, providing a solid foundation for beginners. As you progress, you will delve deeper into host discovery, learning various techniques to identi...
Gespeichert in:
Körperschaft: | |
---|---|
Weitere beteiligte Personen: | , |
Format: | Elektronisch Video |
Sprache: | Englisch |
Veröffentlicht: |
[Birmingham, United Kingdom]
Packt Publishing
[2024]
|
Ausgabe: | [First edition]. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781836202776/?ar |
Zusammenfassung: | This course begins with a straightforward guide to installing Nmap, ensuring that you have the software ready to use. Next, we cover the fundamentals of Nmap, providing a solid foundation for beginners. As you progress, you will delve deeper into host discovery, learning various techniques to identify active hosts on your network. Each step is carefully explained to build your confidence and understanding. The journey continues with an in-depth exploration of port states and port scanning. You'll gain insights into different port states and their implications for network security. Detailed videos on port scanning techniques will teach you how to identify open ports, understand service versions, and recognize vulnerabilities. Advanced port scanning methods, such as IP ID Idle Scan and FTP Bounce, are thoroughly covered, offering you sophisticated tools to enhance your scanning capabilities. Throughout the course, practical examples and hands-on exercises ensure that you can apply what you've learned immediately. By the end, you will possess a comprehensive skill set that enables you to use Nmap effectively for network security and troubleshooting. This course is designed to transform you into a proficient Nmap user, capable of tackling complex network challenges with confidence. |
Beschreibung: | Online resource; title from title details screen (O'Reilly, viewed June 3, 2024) |
Umfang: | 1 Online-Ressource (1 video file (7 hr., 7 min.)) sound, color. |
ISBN: | 9781836202776 1836202776 |
Internformat
MARC
LEADER | 00000ngm a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-104371129 | ||
003 | DE-627-1 | ||
005 | 20240701091202.0 | ||
006 | m o | | | ||
007 | cr uuu---uuuuu | ||
008 | 240701s2024 xx ||| |o o ||eng c | ||
020 | |a 9781836202776 |c electronic video |9 978-1-83620-277-6 | ||
020 | |a 1836202776 |c electronic video |9 1-83620-277-6 | ||
035 | |a (DE-627-1)104371129 | ||
035 | |a (DE-599)KEP104371129 | ||
035 | |a (ORHE)9781836202776 | ||
035 | |a (DE-627-1)104371129 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 004.2/4 |2 23/eng/20240603 | |
245 | 1 | 0 | |a Nmap |
250 | |a [First edition]. | ||
264 | 1 | |a [Birmingham, United Kingdom] |b Packt Publishing |c [2024] | |
300 | |a 1 Online-Ressource (1 video file (7 hr., 7 min.)) |b sound, color. | ||
336 | |a zweidimensionales bewegtes Bild |b tdi |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; title from title details screen (O'Reilly, viewed June 3, 2024) | ||
520 | |a This course begins with a straightforward guide to installing Nmap, ensuring that you have the software ready to use. Next, we cover the fundamentals of Nmap, providing a solid foundation for beginners. As you progress, you will delve deeper into host discovery, learning various techniques to identify active hosts on your network. Each step is carefully explained to build your confidence and understanding. The journey continues with an in-depth exploration of port states and port scanning. You'll gain insights into different port states and their implications for network security. Detailed videos on port scanning techniques will teach you how to identify open ports, understand service versions, and recognize vulnerabilities. Advanced port scanning methods, such as IP ID Idle Scan and FTP Bounce, are thoroughly covered, offering you sophisticated tools to enhance your scanning capabilities. Throughout the course, practical examples and hands-on exercises ensure that you can apply what you've learned immediately. By the end, you will possess a comprehensive skill set that enables you to use Nmap effectively for network security and troubleshooting. This course is designed to transform you into a proficient Nmap user, capable of tackling complex network challenges with confidence. | ||
650 | 0 | |a Computer networks |x Monitoring |x Computer programs | |
650 | 0 | |a Computer networks |x Security measures |x Computer programs | |
650 | 0 | |a Penetration testing (Computer security) | |
650 | 4 | |a Réseaux d'ordinateurs ; Surveillance ; Logiciels | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures ; Logiciels | |
650 | 4 | |a Tests d'intrusion | |
650 | 4 | |a Instructional films | |
650 | 4 | |a Nonfiction films | |
650 | 4 | |a Internet videos | |
650 | 4 | |a Films de formation | |
650 | 4 | |a Films autres que de fiction | |
650 | 4 | |a Vidéos sur Internet | |
700 | 1 | |a Lowrie, Daniel |e MitwirkendeR |4 ctb | |
700 | 1 | |a Bryan, Wes |e MitwirkendeR |4 ctb | |
710 | 2 | |a ACI Learning (Firm), |e MitwirkendeR |4 ctb | |
710 | 2 | |a Packt Publishing, |e Verlag |4 pbl | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781836202776/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
935 | |c vide | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-104371129 |
---|---|
_version_ | 1821494930453823488 |
adam_text | |
any_adam_object | |
author2 | Lowrie, Daniel Bryan, Wes |
author2_role | ctb ctb |
author2_variant | d l dl w b wb |
author_corporate | ACI Learning (Firm) |
author_corporate_role | ctb |
author_facet | Lowrie, Daniel Bryan, Wes ACI Learning (Firm) |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)104371129 (DE-599)KEP104371129 (ORHE)9781836202776 |
dewey-full | 004.2/4 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.2/4 |
dewey-search | 004.2/4 |
dewey-sort | 14.2 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | [First edition]. |
format | Electronic Video |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03329ngm a22005532 4500</leader><controlfield tag="001">ZDB-30-ORH-104371129</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240701091202.0</controlfield><controlfield tag="006">m o | | </controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240701s2024 xx ||| |o o ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781836202776</subfield><subfield code="c">electronic video</subfield><subfield code="9">978-1-83620-277-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1836202776</subfield><subfield code="c">electronic video</subfield><subfield code="9">1-83620-277-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)104371129</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP104371129</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781836202776</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)104371129</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.2/4</subfield><subfield code="2">23/eng/20240603</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Nmap</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Birmingham, United Kingdom]</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">[2024]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 video file (7 hr., 7 min.))</subfield><subfield code="b">sound, color.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">zweidimensionales bewegtes Bild</subfield><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from title details screen (O'Reilly, viewed June 3, 2024)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This course begins with a straightforward guide to installing Nmap, ensuring that you have the software ready to use. Next, we cover the fundamentals of Nmap, providing a solid foundation for beginners. As you progress, you will delve deeper into host discovery, learning various techniques to identify active hosts on your network. Each step is carefully explained to build your confidence and understanding. The journey continues with an in-depth exploration of port states and port scanning. You'll gain insights into different port states and their implications for network security. Detailed videos on port scanning techniques will teach you how to identify open ports, understand service versions, and recognize vulnerabilities. Advanced port scanning methods, such as IP ID Idle Scan and FTP Bounce, are thoroughly covered, offering you sophisticated tools to enhance your scanning capabilities. Throughout the course, practical examples and hands-on exercises ensure that you can apply what you've learned immediately. By the end, you will possess a comprehensive skill set that enables you to use Nmap effectively for network security and troubleshooting. This course is designed to transform you into a proficient Nmap user, capable of tackling complex network challenges with confidence.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Monitoring</subfield><subfield code="x">Computer programs</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">Computer programs</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Surveillance ; Logiciels</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures ; Logiciels</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Tests d'intrusion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Instructional films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Nonfiction films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet videos</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Films de formation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Films autres que de fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Vidéos sur Internet</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lowrie, Daniel</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bryan, Wes</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ACI Learning (Firm),</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Packt Publishing,</subfield><subfield code="e">Verlag</subfield><subfield code="4">pbl</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781836202776/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="935" ind1=" " ind2=" "><subfield code="c">vide</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-104371129 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:22:12Z |
institution | BVB |
isbn | 9781836202776 1836202776 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 video file (7 hr., 7 min.)) sound, color. |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Packt Publishing |
record_format | marc |
spelling | Nmap [First edition]. [Birmingham, United Kingdom] Packt Publishing [2024] 1 Online-Ressource (1 video file (7 hr., 7 min.)) sound, color. zweidimensionales bewegtes Bild tdi rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; title from title details screen (O'Reilly, viewed June 3, 2024) This course begins with a straightforward guide to installing Nmap, ensuring that you have the software ready to use. Next, we cover the fundamentals of Nmap, providing a solid foundation for beginners. As you progress, you will delve deeper into host discovery, learning various techniques to identify active hosts on your network. Each step is carefully explained to build your confidence and understanding. The journey continues with an in-depth exploration of port states and port scanning. You'll gain insights into different port states and their implications for network security. Detailed videos on port scanning techniques will teach you how to identify open ports, understand service versions, and recognize vulnerabilities. Advanced port scanning methods, such as IP ID Idle Scan and FTP Bounce, are thoroughly covered, offering you sophisticated tools to enhance your scanning capabilities. Throughout the course, practical examples and hands-on exercises ensure that you can apply what you've learned immediately. By the end, you will possess a comprehensive skill set that enables you to use Nmap effectively for network security and troubleshooting. This course is designed to transform you into a proficient Nmap user, capable of tackling complex network challenges with confidence. Computer networks Monitoring Computer programs Computer networks Security measures Computer programs Penetration testing (Computer security) Réseaux d'ordinateurs ; Surveillance ; Logiciels Réseaux d'ordinateurs ; Sécurité ; Mesures ; Logiciels Tests d'intrusion Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet Lowrie, Daniel MitwirkendeR ctb Bryan, Wes MitwirkendeR ctb ACI Learning (Firm), MitwirkendeR ctb Packt Publishing, Verlag pbl |
spellingShingle | Nmap Computer networks Monitoring Computer programs Computer networks Security measures Computer programs Penetration testing (Computer security) Réseaux d'ordinateurs ; Surveillance ; Logiciels Réseaux d'ordinateurs ; Sécurité ; Mesures ; Logiciels Tests d'intrusion Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
title | Nmap |
title_auth | Nmap |
title_exact_search | Nmap |
title_full | Nmap |
title_fullStr | Nmap |
title_full_unstemmed | Nmap |
title_short | Nmap |
title_sort | nmap |
topic | Computer networks Monitoring Computer programs Computer networks Security measures Computer programs Penetration testing (Computer security) Réseaux d'ordinateurs ; Surveillance ; Logiciels Réseaux d'ordinateurs ; Sécurité ; Mesures ; Logiciels Tests d'intrusion Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
topic_facet | Computer networks Monitoring Computer programs Computer networks Security measures Computer programs Penetration testing (Computer security) Réseaux d'ordinateurs ; Surveillance ; Logiciels Réseaux d'ordinateurs ; Sécurité ; Mesures ; Logiciels Tests d'intrusion Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
work_keys_str_mv | AT lowriedaniel nmap AT bryanwes nmap AT acilearningfirm nmap AT packtpublishing nmap |