YoVDO

Ethical Hacking: Enumeration

Offered By: Pluralsight

Tags

Ethical Hacking Courses Cybersecurity Courses LDAP Courses Enumeration Courses

Course Description

Overview

The third phase attackers perform on a target is enumerating accounts and services. This course will teach you skills attackers use for enumeration that needed for the Certified Ethical Hacking exam.

To truly compromise a system, making sure you know what OS, accounts, and services that are running is key. In this course, Ethical Hacking: Enumeration, you’ll learn to identify accounts and services through enumeration. First, you’ll explore how to use NetBIOS to expose intel. Next, you’ll discover how to use LDAP to expose user accounts and other protocols to complete your enumeration tasks. Finally, you’ll learn the countermeasures to thwart enumeration attacks. When you’re finished with this course, you’ll have the skills and knowledge of enumeration techniques needed for the Certified Ethical Hacking exam.

Syllabus

  • Course Overview 1min
  • Discussing Enumeration and the Techniques Used 17mins
  • Defaults and NetBIOS 35mins
  • Capture SNMP Enumeration 12mins
  • Demonstrating LDAP Enumeration 12mins
  • Examining NTP and NFS Enumeration 7mins
  • Exploring SMTP Enumeration 12mins
  • Employing DNS Enumeration 15mins
  • Acquiring Intel from Other Enumeration Techniques 24mins
  • Discovering Enumeration Countermeasures 12mins
  • Domain Summary 3mins

Taught by

Dale Meredith

Related Courses

Spring Framework: Authenticating Users with Spring Security
Pluralsight
Learn DevOps: On-Prem or Cloud Agnostic Kubernetes
Udemy
Spring Security Basics
YouTube
Splunk Enterprise Administration: Managing Users and Authentication
Pluralsight
Ethical Hacking: Enumeration
Pluralsight