Ethical Hacking: Enumeration
Offered By: LinkedIn Learning
Course Description
Overview
Learn about the basic methods of enumerating networks and target systems using the standard ethical hacking enumeration tools.
Syllabus
Introduction
- Starting your testing with enumeration
- What you need to know
- Disclaimer
- What is enumeration?
- Understanding contexts
- Working with contexts
- Understanding NetBIOS, SMB, SAMBA, and RPC
- Profiling a Unix host
- Profiling a Windows host
- Investigating the Windows network interface
- Investigating the Linux network interface
- Enumerating host services
- Enumerating SMB from Linux: Episode 1
- Enumerating SMB from Linux: Episode 2
- Enumerating SMB from Linux: Episode 3
- Enumerating SMB from Windows: Episode 1
- Enumerating SMB from Windows: Episode 2
- Enumerating using SNMP
- Enumerating with RPC
- Using WMI to enumerate Windows
- Enumeration using Finger
- Remote enumeration using PowerShell
- What is that web server?
- Enumerating a website with Nikto
- Enumerating webpages
- Enumerating hidden webpages
- Tracing routes across the internet routes
- Using Shodan
- Scan the internet with ZMap
- Enumeration of the cloud
- Enumerating cloud policies
- Enumerating cloud compute resources
- Enumerating cloud storage resources
- Scanning with SuperScan
- Scanning with NetScanTools Pro
- Enumerating LDAP
- Checking for SMTP users
- Digging into DNS
- Enumerating netbios
- Taking time to enumerate
- Next steps
Taught by
Malcolm Shore
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network