Nmap and Network Scanning

  1. Introduction to Network Scanning
    1. Purpose of Network Scanning
      1. Security Auditing
        1. Vulnerability Assessment
          1. Security Posture Evaluation
          2. Network Inventory and Management
            1. Asset Discovery
              1. Service Cataloging
                1. Network Mapping
                2. Vulnerability Identification
                  1. Open Ports
                    1. Outdated Services
                      1. Misconfigurations
                      2. Reconnaissance for Penetration Testing
                        1. Information Gathering
                          1. Attack Surface Mapping
                          2. Compliance Verification
                            1. Policy Enforcement
                              1. Regulatory Requirements
                            2. Types of Network Scans
                              1. Host Discovery
                                1. Live Host Detection
                                  1. Network Range Scanning
                                  2. Port Scanning
                                    1. TCP Port Scanning
                                      1. UDP Port Scanning
                                        1. Service Port Identification
                                        2. Service Enumeration
                                          1. Service Version Detection
                                            1. Service Configuration Analysis
                                            2. Operating System Fingerprinting
                                              1. Active OS Detection
                                                1. Passive OS Detection
                                                2. Vulnerability Scanning
                                                  1. Known Vulnerability Detection
                                                    1. Configuration Weakness Identification