![How to use NMAP – which is the “right” NMAP scan to use? | University of South Wales: Cyber University of the year: Three years running: 2019, 2020, 2021 How to use NMAP – which is the “right” NMAP scan to use? | University of South Wales: Cyber University of the year: Three years running: 2019, 2020, 2021](https://uwnthesis.files.wordpress.com/2013/06/nmap-scan-summary.jpg)
How to use NMAP – which is the “right” NMAP scan to use? | University of South Wales: Cyber University of the year: Three years running: 2019, 2020, 2021
![Nmap cheat sheet: From discovery to exploits, part 2: Advance port scanning with Nmap and custom idle scan | Infosec Resources Nmap cheat sheet: From discovery to exploits, part 2: Advance port scanning with Nmap and custom idle scan | Infosec Resources](https://resources.infosecinstitute.com/wp-content/uploads/051914_1336_NmapCheatSh1.png)
Nmap cheat sheet: From discovery to exploits, part 2: Advance port scanning with Nmap and custom idle scan | Infosec Resources
![Nmap cheat sheet: From discovery to exploits, part 2: Advance port scanning with Nmap and custom idle scan | Infosec Resources Nmap cheat sheet: From discovery to exploits, part 2: Advance port scanning with Nmap and custom idle scan | Infosec Resources](https://resources.infosecinstitute.com/wp-content/uploads/051914_1336_NmapCheatSh12.png)