Ethical Hacking: Enumeration
Offered By: Pluralsight
Course Description
Overview
Pluralsight is not an official partner or accredited training center of
EC-Council. Now that we've found out "live" systems and hopefully determined the OS by fingerprinting, our next phase of Ethical Hacking is to now extrapolate data.
Pluralsight is not an official partner or accredited training center of EC-Council. Enumeration is the first official attack at your target. Enumeration is the process of gathering information that might include user names, computer names, network shares, services running, and other possible points of entry. This course we'll show different techniques that can be used against your network. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking
Topics:
Pluralsight is not an official partner or accredited training center of EC-Council. Enumeration is the first official attack at your target. Enumeration is the process of gathering information that might include user names, computer names, network shares, services running, and other possible points of entry. This course we'll show different techniques that can be used against your network. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking
Topics:
- Enumeration Explained & the Techniques Used
- Enumerating via Defaults & NetBIOS
- Enumerating via SNMP
- Enumerating via LDAP
- Enumerating via NTP
- Enumerating via SMTP
- Enumerating via DNS
- Oh, There's More
- Countermeasures for Enumeration
Taught by
Dale Meredith
Related Courses
Cisco CCNP ENARSI (300-410) Cert Prep: 4 Infrastructure ServicesLinkedIn Learning Cisco CCNP ENCOR (350-401) Cert Prep: 2 Network Management, Security, and Automation
LinkedIn Learning Cisco Network Security: Secure Access
LinkedIn Learning Ethical Hacking: Enumeration
LinkedIn Learning JNCIA (JN0-103) Cert Prep: 2 Configuration, Monitor, and Maintain
LinkedIn Learning