Ethical Hacking: Enumeration
Offered By: Pluralsight
Course Description
Overview
The third phase attackers perform on a target is enumerating accounts and services. This course will teach you skills attackers use for enumeration that needed for the Certified Ethical Hacking exam.
To truly compromise a system, making sure you know what OS, accounts, and services that are running is key. In this course, Ethical Hacking: Enumeration, you’ll learn to identify accounts and services through enumeration. First, you’ll explore how to use NetBIOS to expose intel. Next, you’ll discover how to use LDAP to expose user accounts and other protocols to complete your enumeration tasks. Finally, you’ll learn the countermeasures to thwart enumeration attacks. When you’re finished with this course, you’ll have the skills and knowledge of enumeration techniques needed for the Certified Ethical Hacking exam.
To truly compromise a system, making sure you know what OS, accounts, and services that are running is key. In this course, Ethical Hacking: Enumeration, you’ll learn to identify accounts and services through enumeration. First, you’ll explore how to use NetBIOS to expose intel. Next, you’ll discover how to use LDAP to expose user accounts and other protocols to complete your enumeration tasks. Finally, you’ll learn the countermeasures to thwart enumeration attacks. When you’re finished with this course, you’ll have the skills and knowledge of enumeration techniques needed for the Certified Ethical Hacking exam.
Syllabus
- Course Overview 1min
- Discussing Enumeration and the Techniques Used 17mins
- Defaults and NetBIOS 35mins
- Capture SNMP Enumeration 12mins
- Demonstrating LDAP Enumeration 12mins
- Examining NTP and NFS Enumeration 7mins
- Exploring SMTP Enumeration 12mins
- Employing DNS Enumeration 15mins
- Acquiring Intel from Other Enumeration Techniques 24mins
- Discovering Enumeration Countermeasures 12mins
- Domain Summary 3mins
Taught by
Dale Meredith
Related Courses
程序设计实习 / Practice on ProgrammingPeking University via Coursera 算法基础
Peking University via Coursera 算法基础 | Fundamental Algorithms
Peking University via edX 算法基础
Peking University via Coursera Complete Cyber Security Course: Go From Zero To Hero
Udemy