Cybersecurity

Published on January 15, 2026 at 12:12 AM

Cybersecurity

From Zero to First Nmap Scan: My Intro to Ethical Hacking

A beginner-friendly walkthrough of my first Nmap network scan in a cybersecurity lab, plus what the results actually mean.

In my first cybersecurity lab, I used Kali Linux to run Nmap against a controlled target. It looked intimidating at first, but once I understood what a port, service, and version scan actually do, it became a lot less scary.

In this post, I cover:

  • Basic Nmap commands I started with

  • How to read the scan output without panicking

  • Why scanning your own lab environment is essential (and safe)

  • How this ties into bigger topics like vulnerability assessment

If you are new to ethical hacking, this is written from a student’s point of view using plain language.

Read More--->

Add comment

Comments

There are no comments yet.