By the end of this section, you will be able to:
● Use Nmap to perform network scanning and host discovery.
● Identify open ports, running services, and potential vulnerabilities.
● Analyze scan results to assess the security posture of each device in the lab.
In this part of the lab, you will learn:
● How to install and launch Nmap on a scanning machine.
● The difference between various scan types, Ping scan, Service scans, etc
● How to interpret Nmap results and prioritize remediation steps.