Companies Home Search Profile

Conducting Active Reconnaissance for CompTIA PenTest+

Focused View

Dale Meredith

3:47:28

42 View
  • 01.01.Course Overview.mp4
    02:42
  • 02.01.Course Introduction.mp4
    01:47
  • 02.02.The Goals and Types of Scanning.mp4
    07:12
  • 02.03.Your New Best Friend Nmap.mp4
    05:29
  • 02.04.Demo A Little Housekeeping and Some Discovery Scanning.mp4
    08:55
  • 02.05.Demo Port Scanning.mp4
    06:38
  • 02.06.Demo Stealth Scanning.mp4
    06:51
  • 02.07.Demo Full Scans.mp4
    07:55
  • 02.08.Packet Crafting.mp4
    02:56
  • 02.09.What We Learned.mp4
    00:35
  • 03.01.Mapping the Network.mp4
    06:47
  • 03.02.Your Other Best Friend Metasploit.mp4
    04:25
  • 03.03.Demo Take Metasploit for a Test Drive.mp4
    07:21
  • 03.04.Demo Continuing to Test Drive Metasploit.mp4
    08:06
  • 04.01.The Goal of Enumeration.mp4
    04:05
  • 04.02.Banner Grabbing.mp4
    01:06
  • 04.03.Demo Grabbing Some Banners.mp4
    06:51
  • 04.04.Windows Host Enumeration.mp4
    00:48
  • 04.05.Demo Enumerating Windows Using Built-in Commands.mp4
    09:39
  • 04.06.Demo Enumerating Windows Using Powershell Commands.mp4
    07:12
  • 04.07.Demo Our Best Friend Nmap is Back.mp4
    02:51
  • 04.08.Demo More Metasploit Goodness.mp4
    06:46
  • 05.01.What Youll Learn.mp4
    00:55
  • 05.02.Linux Host Enumeration.mp4
    01:16
  • 05.03.Demo Enumerating Linux Using Built-in Commands.mp4
    10:06
  • 05.04.Service and Application Enumeration.mp4
    08:35
  • 05.05.Network Shares.mp4
    01:36
  • 05.06.Demo Enumerating Network Shares.mp4
    03:35
  • 05.07.Null Sessions.mp4
    02:25
  • 05.08.Website Enumeration.mp4
    01:51
  • 05.09.Demo Enumerating a Website.mp4
    03:59
  • 05.10.What We Learned.mp4
    01:43
  • 06.01.What Youll Learn.mp4
    00:51
  • 06.02.What Are Vulnerability Scans.mp4
    02:06
  • 06.03.The Tools of the Trade.mp4
    04:41
  • 06.04.Types of Vulnerability Scans Compliance, Host, and Credentials.mp4
    03:11
  • 06.05.Types of Vulnerability Scans Service, Web-server, and Database.mp4
    05:35
  • 06.06.Types of Vulnerability Scans Application, Network Devices, and Packet Crafting.mp4
    05:02
  • 06.07.Types of Vulnerability Scans Firewalls, Packet Inspection, and WAPs.mp4
    04:05
  • 06.08.Types of Vulnerability Scans Containers and Whats Next.mp4
    04:04
  • 06.09.What We Learned.mp4
    00:53
  • 07.01.Why Scripting.mp4
    01:34
  • 07.02.Getting Your BASH, Powershell, Python and Ruby On!.mp4
    06:57
  • 07.03.Variables.mp4
    02:27
  • 07.04.Arrays.mp4
    03:26
  • 07.05.Operations.mp4
    04:18
  • 07.06.InputOutput.mp4
    02:34
  • 07.07.InputOutput Examples.mp4
    05:17
  • 07.08.Encoding and Decoding.mp4
    03:28
  • 07.09.Prepacked Scripting Tools.mp4
    05:27
  • 07.10.New Pentesting Document Solutions.mp4
    07:50
  • 07.11.Dont Miss This Clip!.mp4
    00:44
  • Description


    Active reconnaissance is a necessary evil. It can sometimes alert defense teams and systems that you're snooping around, but it also helps you to see and document everything about each note on the network. Learn how to active recon the right way.

    What You'll Learn?


      Up until now, we have been "quiet" as far as reconnaissance goes. But the downside is that many times we won't see every single system through passive methods. This is were Active Reconnaissance comes in to play.

      In this course, Conducting Active Reconnaissance for CompTIA PenTest+, you will gain the ability to discover more network nodes and collect system information during your penetration tests. First, you will learn how to discover all the targets on a given network. Next, you will discover how to use enumeration to find services and even accounts on the targets. Then, you will see how to scan each one for vulnerabilities which might allow someone to gain unauthorized access to protected digital or electronic materials, and may go around routers or even firewalls to get in. Finally, you will explore how to look at different types of scripts and some cool tools to help automate your tasks.

      When you’re finished with this course, you will have the skills and knowledge of discovering as many nodes, services accounts, and even some vulnerabilities needed to cover every aspect of the active reconnaissance step within any pentest engagement.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Dale Meredith
    Dale Meredith
    Instructor's Courses
    Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale's expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material. Straddling the line of fun and function, Dale's instruction is memorable and entertaining. Dale's knowledge and understanding of current trends in technology and applications have led to many opportunities, such as: training various Inc 500 companies, universities, and Divisions of the Department of Homeland Security for the United States government. Along with authoring for Pluralsight, consulting, and IT classroom training, you can catch Dale on stage speaking at IT conferences, helping IT teams keep their companies safe, relevant, and "breach" aware. Outside of the professional sphere, Dale spends quite a bit of his time giving back by speaking at adult and youth non-profit community gatherings and posting on his 'Dale Dumbs IT Down' social media sites. Dale uses these speaking engagements and social media sites to 'Dumb Down IT' concepts with the intent to help everyone be safe and smart with their technology and personal devices. Dale also specializes in Active Directory, Exchange Server, IIS, PowerShell, SharePoint, System Center/Desktop Deployment, and Private Cloud
    Pluralsight, LLC is an American privately held online education company that offers a variety of video training courses for software developers, IT administrators, and creative professionals through its website. Founded in 2004 by Aaron Skonnard, Keith Brown, Fritz Onion, and Bill Williams, the company has its headquarters in Farmington, Utah. As of July 2018, it uses more than 1,400 subject-matter experts as authors, and offers more than 7,000 courses in its catalog. Since first moving its courses online in 2007, the company has expanded, developing a full enterprise platform, and adding skills assessment modules.
    • language english
    • Training sessions 52
    • duration 3:47:28
    • level preliminary
    • Release Date 2023/10/20