YoVDO

Ethical Hacking: Enumeration

Offered By: Pluralsight

Tags

Ethical Hacking Courses Cybersecurity Courses DNS Courses LDAP Courses Enumeration Courses SNMP Courses NTP Courses

Course Description

Overview

Pluralsight is not an official partner or accredited training center of EC-Council. Now that we've found out "live" systems and hopefully determined the OS by fingerprinting, our next phase of Ethical Hacking is to now extrapolate data.

Pluralsight is not an official partner or accredited training center of EC-Council. Enumeration is the first official attack at your target. Enumeration is the process of gathering information that might include user names, computer names, network shares, services running, and other possible points of entry. This course we'll show different techniques that can be used against your network. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking

Topics:
  • Enumeration Explained & the Techniques Used
  • Enumerating via Defaults & NetBIOS
  • Enumerating via SNMP
  • Enumerating via LDAP
  • Enumerating via NTP
  • Enumerating via SMTP
  • Enumerating via DNS
  • Oh, There's More
  • Countermeasures for Enumeration

Taught by

Dale Meredith

Related Courses

程序设计实习 / Practice on Programming
Peking University via Coursera
算法基础
Peking University via Coursera
算法基础 | Fundamental Algorithms
Peking University via edX
算法基础
Peking University via Coursera
Complete Cyber Security Course: Go From Zero To Hero
Udemy