This document provides information and examples for using Nmap, a security scanning tool. It outlines options for specifying targets, port scanning techniques, host and service detection, firewall evasion, timing and performance, output formats, and example usage scenarios. Targets can be specified by IP, hostname, or subnet. Common port scanning types include TCP SYN, connect, UDP, and SCTP scans. Options are provided for service and OS detection, firewall evasion using fragmentation and decoys, tuning timing and performance, and selecting output formats. Examples demonstrate quick port scans, ping scans, traceroutes, and running Nmap scripts.