Understanding and effectively using Nmap requires that you understand the basics of computer networks and network protocols. You can learn these things in the computer networks course.
Nmap (Network Mapper) is a free and open-source network mapping tool. It can be used to identify which network devices and services are in use, as well as how they are configured.
Nmap operates by sending network traffic with different protocols and analyzing the responses. It can scan individual IP addresses or large ranges of IP addresses, and it can identify servers, routers, computers, and other network devices. Nmap can also identify the ports and protocols used by network services, helping to discover potential security risks and vulnerabilities in the network environment.
The Nmap is typically used by security auditors or penetration testers to find targets and vulnerabilities, but also network administrators can use Nmap to gain visibility into their own network.
Example of Nmap scan results.
bob@marley-2 :: ~ $ sudo nmap -sSV 127.0.0.1
Starting Nmap 7.91 ( https://nmap.org ) at 2023-05-02 19:44 EEST
Nmap scan report for localhost (127.0.0.1)
Host is up (0.000080s latency).
Not shown: 999 closed ports
PORT STATE SERVICE VERSION
8000/tcp open http SimpleHTTPServer 0.6 (Python 3.11.3)
Service detection performed. Please report any incorrect results at https://nmap.org/submit/.
Nmap done: 1 IP address (1 host up) scanned in 6.21 seconds


Ready to become an ethical hacker?
Start today.
As a member of Hakatemia you get unlimited access to Hakatemia modules, exercises and tools, and you get access to the Hakatemia Discord channel where you can ask for help from both instructors and other Hakatemia members.