• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Nmap Scanning

Results for "nmap scanning"


  • E

    Edureka

    Cybersecurity Analyst

    Skills you'll gain: Cyber Threat Intelligence, Cyber Operations, Cyber Threat Hunting, Threat Modeling, Cybersecurity, Cyber Security Strategy, Network Security, MITRE ATT&CK Framework, Intrusion Detection and Prevention, Cyber Attacks, Linux Commands, Linux, Cyber Engineering, Network Administration, Operating System Administration, Hardening, Network Monitoring, Exploitation techniques, Security Awareness, Operating Systems

    Intermediate · Specialization · 3 - 6 Months

  • C

    Coursera

    Medical Records: Scan, Release, Audit

    Skills you'll gain: Medical Privacy, Medical Records, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Health Information Management and Medical Records, Clinical Documentation, Electronic Medical Record, Document Management, Patient Safety, Record Keeping, Records Management, Auditing, Regulatory Compliance, Document Control, Information Privacy, File Management, Quality Assurance, Data Entry

    Beginner · Course · 1 - 4 Weeks

  • M

    Microsoft

    Microsoft Cybersecurity Analyst

    Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, System Testing, Cloud Security, Vulnerability Scanning, Threat Management, Cloud Computing, Authentications, Active Directory, Operating Systems, Data Management, Computer Security Incident Management

    4.7
    Rating, 4.7 out of 5 stars
    ·
    3K reviews

    Beginner · Professional Certificate · 3 - 6 Months

  • E

    Edureka

    Penetration Testing and Vulnerability Scanning

    Skills you'll gain: Penetration Testing, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Cyber Security Assessment, Open Web Application Security Project (OWASP), Exploitation techniques, Application Security, Patch Management, Cyber Threat Intelligence, Web Applications, Cyber Engineering, Cyber Security Policies, Cyber Governance, Risk Management Framework, Linux Administration, Ethical Standards And Conduct, Linux, Linux Commands, Linux Servers

    Beginner · Course · 1 - 4 Weeks

  • C

    Coursera

    Evaluate, Create, and Analyze App Security

    Skills you'll gain: Threat Modeling, Security Testing, Secure Coding, Vulnerability Scanning, Penetration Testing, Vulnerability Management, Dependency Analysis, Application Security, Cyber Security Assessment, Security Requirements Analysis, DevSecOps, Security Strategy, Code Review, Risk Management Framework

    Intermediate · Course · 1 - 4 Weeks

  • C

    Coursera

    Strategic Sourcing and Prioritization

    Skills you'll gain: Strategic Sourcing, Procurement, Supplier Management, Request for Proposal, Prioritization, Risk Mitigation, Supplier Relationship Management, Risk Analysis, Generative AI Agents, Market Intelligence, Market Research, Data-Driven Decision-Making, Cost Benefit Analysis, Environmental Social And Corporate Governance (ESG), Analysis, Financial Modeling

    Beginner · Course · 1 - 3 Months

What brings you to Coursera today?

  • C

    Coursera

    QuickBooks: Record, Classify, & Report Expenses

    Skills you'll gain: QuickBooks (Accounting Software), Expense Reports, Expense Management, Accounting Software, Bookkeeping, Accounting Records, Record Keeping, Accounting, Small Business Accounting, Accounts Payable, General Ledger, Transaction Processing, Financial Accounting, General Accounting, Financial Reporting, Data Entry

    Beginner · Course · 1 - 4 Weeks

  • I

    IBM

    Security Analyst Fundamentals

    Skills you'll gain: Digital Forensics, Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Threat Modeling, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Cybersecurity, Security Management, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, AI Security

    4.7
    Rating, 4.7 out of 5 stars
    ·
    4.5K reviews

    Beginner · Specialization · 3 - 6 Months

  • P

    Packt

    Getting Started in Port Scanning Using Nmap and Kali Linux

    Skills you'll gain: Vulnerability Scanning, Network Security, Configuration Management, System Configuration, Firewall, Linux Commands, Servers, TCP/IP, Network Analysis, Software Versioning

    Intermediate · Course · 1 - 4 Weeks

  • L

    LearnKartS

    Ethical Hacking

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Penetration Testing, Security Testing, Cyber Security Assessment, Cyber Threat Hunting, Cryptographic Protocols, Cybersecurity, Cyber Threat Intelligence, Cryptography, Exploit development, Open Web Application Security Project (OWASP), Cyber Security Strategy, Cyber Attacks, Amazon Web Services, Application Security, Security Awareness, Security Controls, Data Security, Cyber Risk, Security Strategy

    4.6
    Rating, 4.6 out of 5 stars
    ·
    291 reviews

    Beginner · Specialization · 1 - 3 Months

  • E

    EC-Council

    Cybersecurity Attack and Defense Fundamentals

    Skills you'll gain: Digital Forensics, Penetration Testing, Network Security, Threat Management, Mobile Security, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Vulnerability Scanning, Cybersecurity, Authorization (Computing), Malware Protection, Authentications, Identity and Access Management, Cyber Attacks, Threat Detection, Data Integrity

    4.6
    Rating, 4.6 out of 5 stars
    ·
    800 reviews

    Beginner · Specialization · 3 - 6 Months

  • L

    LearnKartS

    CompTIA Security+ Certification Preparation

    Skills you'll gain: Computer Security Incident Management, Vulnerability Management, Cyber Security Strategy, Cyber Governance, Incident Response, Cyber Threat Intelligence, Encryption, Cyber Attacks, Governance Risk Management and Compliance, Threat Detection, Security Strategy, Mobile Security, Business Risk Management, Cyber Security Policies, Cyber Security Assessment, Compliance Management, Vulnerability, Security Awareness, Vulnerability Assessments, Vulnerability Scanning

    4.6
    Rating, 4.6 out of 5 stars
    ·
    48 reviews

    Beginner · Specialization · 1 - 3 Months

Searches related to nmap scanning

vulnerability scanning with nmap: network scanning
getting started in port scanning using nmap and kali linux
1234…21

In summary, here are 10 of our most popular nmap scanning courses

  • Cybersecurity Analyst: Edureka
  • Medical Records: Scan, Release, Audit: Coursera
  • Microsoft Cybersecurity Analyst: Microsoft
  • Penetration Testing and Vulnerability Scanning: Edureka
  • Evaluate, Create, and Analyze App Security: Coursera
  • Strategic Sourcing and Prioritization: Coursera
  • QuickBooks: Record, Classify, & Report Expenses: Coursera
  • Security Analyst Fundamentals: IBM
  • Getting Started in Port Scanning Using Nmap and Kali Linux: Packt
  • Ethical Hacking: LearnKartS

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok