Advanced NMAP


Discover the secrets of ethical hacking and network discovery, using Nmap, with this advanced course.

Nmap is the most popular network scanner and is widely used in vulnerability assessment and penetration testing. Nmap has advanced features which should also be considered during security assessments. Nmap is not only used for port scanning but also finding out other details like operating systems detection, vulnerability discovery and much more. Find out all about the advanced features and uses of Nmap with this comprehensive course.

Benefits of choosing this course

Benefits of choosing the Advanced NMAP course


Learn all about scanning networks, finding various hosts and services.


Gain in-depth knowledge of Nmap scripting engine and how to use the Nmap scripts during vulnerability assessments.


Understand how to harness the true benefits of this flexible, powerful and easy-to-use tool.

Highlights of the Advanced NMAP course


14 practical lab sessions and 23 theory sessions result in in-depth learning.


One course covering all aspects of Nmap - from the most basic to the more comprehensive.


Created by experts to help you achieve an advanced level of understanding of this powerful vulnerability assessment and pentesting tool.

  • Key Learning Objectives
  • Downloads
  • About
  • Key Learning Objectives

      After completing the Advanced NMAP course, you will be able to:
    • Understand and explain the basics of Nmap, who created the tool and what its benefits are.
    • Install Nmap for different Operating Systems.
    • Enhance your knowledge of basic Scans and how routers, firewalls etc can skew the results of an Nmap scan.
    • Figure out how to scan single and multiple targets using Nmap.

    • Understand the Nmap Aggressive mode and how it can provide additional information about each open port compared to regular scan types.
    • Enhance your knowledge of advanced scanning options in Nmap such as TCP Scanning, UDP Scan, IP Protocol Scan, SYN Health Scan etc.
    • Work with Nmap Timing Options and use them to slow down or speed up the scan depending on your requirements.
    • Improve your knowledge of Nmap output format options and how they can be of use to you when scanning a large network.
    • Explain what Zenmap is and how to use it.
    • Articulate what the Nmap Scripting Engine is and explain how to unlock its potential.
  • Direct Downloads

    Directly download the full Learning Objectives of the course here

    Templates. Worksheets & Mind-maps

    When you enrol in this course you will have access to several worksheets & templates that you can use immediately. Take a look at the course curriculum, below, to see whats included in this course.

    The image immediately below is a gallery view of some of the templates and collateral available to students.

    Continuing Professional Development

    CPD points can be claimed for this course at the rate of 1 point per hour of training for this NCSC-certified and CIISec-approved course (8 points for one-day public course and 15 points for the two-day internal workshop - for when organisations host this course internally).

    CIPR Student-Only Incident Response Plan Template

    As a student you get access to unique content including our highly acclaimed Cyber Incident Response Plan Template. If you want, you can download the FREE version of the Incident Response Plan template here.

  • About

Example Curriculum

  Section 1: Introduction
Available in days
days after you enroll
  Section 2: Basic Scans
Available in days
days after you enroll
  Section 3: Advanced Scanning Options
Available in days
days after you enroll
  Section 4: Timing Options
Available in days
days after you enroll
  Section 5: Output Options
Available in days
days after you enroll
  Section 6: ZenMap
Available in days
days after you enroll
  Section 7: Nmap Scripting
Available in days
days after you enroll
  Advanced Nmap Quiz
Available in days
days after you enroll

Sign up and Start Today


Pay-in-full in your local currency (where available)


We take all major forms of payment and we use secure checkout.

Find out how NMAP & Metasploit can help scan vulnerabilities and help your enhance your resistance to cyber-attacks.