Scan Systems with Nmap
Learn about Nmap and see why it’s such a popular tool for ethical hacking and ethical hackers.
Includes Linux, Command Line, Scripting, Lua, Network Discovery, Networking, Cybersecurity, Nmap, Auditing, Coding, Hacking, Security, Scanning, Discovery, and more.
Skill level
BeginnerTime to complete
Average based on combined completion rates — individual pacing in lessons, projects, and quizzes may vary4 hoursProjects
2Prerequisites
None
About this skill path
Network scanning is essential for cybersecurity professionals to identify any malicious activities and vulnerabilities and gain a better understanding of their network. With the popular ethical hacking tool, Nmap, cybersecurity professionals can efficiently perform network discovery and security auditing. Take this skill path to develop your skill set in network scanning and security auditing.
Skills you'll gain
- Perform network discovery and auditing
- Learn why Lua is used for Nmap scripts
- Create Nmap scripts with Lua
Syllabus
5 units • 7 lessons • 2 projects • 3 quizzes- 1
Introduction
Gain insight into what you will learn in Scan Systems with Nmap
- 2
Nmap Prerequisites
Before diving into Nmap, there are some prerequisites. Cover basic Linux, command line, and networking knowledge before learning about Nmap!
- 3
Getting Started with Nmap
Learners will be able to explain what Nmap is and the commonly used Nmap features for system scanning.
- 4
Nmap Scripting
Use Nmap scripts with the Nmap Scripting Engine (NSE)! Learners will be able to create and use Nmap scripts written in Lua.
- 5
Review: Scan Systems with Nmap
Review what you learned in Scan Systems with Nmap.
Certificate of completion available with Plus or Pro
Earn a certificate of completion and showcase your accomplishment on your resume or LinkedIn.
Projects in this skill path
- practice Project
Nmap Network Scans and Configurations
In this project, you will plan, research, and perform basic network scans using Nmap. - practice Project
Scanning a Target with Nmap
In this project, we will combine what we learned in the previous lessons by using pre-loaded Nmap scripts and self-created Nmap scripts.
Earn a certificate of completion
Show your network you've done the work by earning a certificate of completion for each course or path you finish.- Show proofReceive a certificate that demonstrates you've completed a course or path.
- Build a collectionThe more courses and paths you complete, the more certificates you collect.
- Share with your networkEasily add certificates of completion to your LinkedIn profile to share your accomplishments.
Reviews from learners
- The progress I have made since starting to use codecademy is immense! I can study for short periods or long periods at my own convenience - mostly late in the evenings.ChrisCodecademy Learner @ USA
- I felt like I learned months in a week. I love how Codecademy uses learning by practice and gives great challenges to help the learner to understand a new concept and subject.RodrigoCodecademy Learner @ UK
- Brilliant learning experience. Very interactive. Literally a game changer if you're learning on your own.John-AndrewCodecademy Learner @ USA
Our learners work at
Skill paths help you level-up
Get a specialized skill
Want to level up at work? Gain a practical, real-world skill that you can use right away to stand out at your job.Get step-by-step guidance
We guide you through exactly where to start and what to learn next to build a new skill.Get there quickly
We’ve hand-picked the content in each Skill Path to fast-track your journey and help you gain a new skill in just a few months.
Ready to learn a new skill?
Get started on Scan Systems with Nmap with a free Codecademy account.StartLooking for something else?
Related resources
- Article
Red Team Tools
Let's explore offensive tools used by red teams. - Article
Vulnerability Scans
In this article, you’ll learn about vulnerability scans: Automated scans that search for vulnerabilities and generate reports on their findings. - Article
The Cybersecurity Community
In this article, we will explore communities and organizations within the cybersecurity field.
Related courses and paths
- Free course
Introduction to Cybersecurity
Learn about the fast-growing field of cybersecurity and how to protect your data and information from digital attacks.Beginner Friendly3 hours - Course
Introduction To Ethical Hacking
In this course, you will learn what it means to be an Ethical Hacker, and practice tools and techniques used to hack ethically.With CertificateBeginner Friendly1 hour - Free course
Prompt Engineering: Generative AI for Scanning & Enumeration
Explore the convergence of ethical hacking and AI. Learn how generative AI strengthens network scanning and enumeration in cybersecurity.Intermediate1 hour
Browse more topics
- Cybersecurity220,840 learners enrolled
- IT2,433,853 learners enrolled
- Code foundations7,446,208 learners enrolled
- Computer science5,904,277 learners enrolled
- Web development4,989,220 learners enrolled
- Data science4,506,033 learners enrolled
- Python3,636,939 learners enrolled
- For business3,381,684 learners enrolled
- JavaScript2,874,767 learners enrolled
What's included in skill paths
Practice Projects
Guided projects that help you solidify the skills and concepts you're learning.Assessments
Auto-graded quizzes and immediate feedback help you reinforce your skills as you learn.Certificate of Completion
Earn a document to prove you've completed a course or path that you can share with your network.