Ethical Hacking: Enumeration
Offered By: LinkedIn Learning
Course Description
Overview
Learn about the basic methods of enumerating networks and target systems using the standard ethical hacking enumeration tools.
Syllabus
Introduction
- Starting your testing with enumeration
- What you need to know
- Disclaimer
- What is enumeration?
- Understanding contexts
- Working with contexts
- Understanding NetBIOS, SMB, SAMBA, and RPC
- Profiling a Unix host
- Profiling a Windows host
- Investigating the Windows network interface
- Investigating the Linux network interface
- Enumerating host services
- Enumerating SMB from Linux: Episode 1
- Enumerating SMB from Linux: Episode 2
- Enumerating SMB from Linux: Episode 3
- Enumerating SMB from Windows: Episode 1
- Enumerating SMB from Windows: Episode 2
- Enumerating using SNMP
- Enumerating with RPC
- Using WMI to enumerate Windows
- Enumeration using Finger
- Remote enumeration using PowerShell
- What is that web server?
- Enumerating a website with Nikto
- Enumerating webpages
- Enumerating hidden webpages
- Tracing routes across the internet routes
- Using Shodan
- Scan the internet with ZMap
- Enumeration of the cloud
- Enumerating cloud policies
- Enumerating cloud compute resources
- Enumerating cloud storage resources
- Scanning with SuperScan
- Scanning with NetScanTools Pro
- Enumerating LDAP
- Checking for SMTP users
- Digging into DNS
- Enumerating netbios
- Taking time to enumerate
- Next steps
Taught by
Malcolm Shore
Related Courses
اساسيات تحليل أمن الشبكات باستخدام WiresharkCoursera Project Network via Coursera AWS Managed Services (AMS): Workload Ingest
Amazon Web Services via AWS Skill Builder AWS Storage Gateway Primer: Volume Gateway (Spanish)
Amazon Web Services via AWS Skill Builder 工程圖學 2D CAD 專題
National Taiwan University via Coursera Commandes avancées dans Windows
Coursera Project Network via Coursera