Skip to main content
Linux SecurityBeginnerFree Track

Network Enumeration with Nmap

A tactical enumeration course that teaches Nmap as a discovery engine instead of a memorization exercise.

Use this early in the learning path if you want better recon discipline, cleaner service mapping, and faster triage in labs or bug bounty workflows.

Duration

4h 15m

Learners

67,234

Rating

4.9

Certificate

LinkedIn Learning Certificate of Completion

Learning controls

Course progress

Not started yet

0%

0/12 lessons completed

Ask course AI mentorOpen external provider

Video hosting recommendation

Host paid training on Vimeo OTT, Bunny Stream, or Cloudflare Stream with signed delivery. Keep previews on YouTube or a CDN teaser block, and embed the protected player directly on CyberMind course pages.

Why this course matters

  • Built around hands-on enumeration logic and service prioritization.
  • Ideal companion course before web exploitation or privilege escalation tracks.
  • Good foundational course for beginners who want real recon habits.

Deep syllabus

Linux foundations and secure baselines

Understand how Linux hosts behave before focusing on offensive mechanics.

1h 35m

Enumeration and attack surface review

Use host and network enumeration to find the shortest path to meaningful access.

2h 5m

Shell operations and privilege escalation

Move from initial access into stronger positioning with cleaner escalation logic.

2h 25m

Detection, cleanup, and reporting

Close the loop by showing what defenders should see and how to reduce recurrence.

1h 30m

Outcomes

  • Harden and assess Linux systems with attacker and defender context.
  • Recognize common privilege escalation routes and misconfigurations.
  • Build repeatable workflows for shell access and cleanup.

Prerequisites

  • Basic Linux filesystem and process knowledge.
  • Ability to run VMs or cloud labs.
  • Comfort reading terminal output and logs.

Next task

Continue with "Permissions, ownership, and process anatomy" and keep the completion trail active so the dashboard can remind the learner correctly.

Resume point

Permissions, ownership, and process anatomy • 18m

Tools covered

Kali LinuxNmapLinPEASNetcatmsfvenomtcpdumpWireshark

Use cases

  • Linux SOC and host hardening preparation.
  • Privilege escalation practice before certification labs.
  • Server review and internal attack path mapping.

AI mentor prompts

Give me a Linux privilege escalation enumeration checklist.
Explain when I should use tcpdump versus Wireshark in this track.
Summarize the Linux hardening topics I should know before the labs.
Open AI helper

FAQs

Do I need Kali specifically?

No, but Kali packages most of the assessment tooling used in the lessons and reduces setup time.

Is this useful for defenders too?

Yes. The course mixes hardening, visibility, and attacker workflows so blue and red teams both gain value.

How should I practice safely?

Use isolated labs, owned machines, or training platforms instead of production systems.

Related tracks

Continue the same domain

Browse all courses