Companies Home Search Profile

Ethical Hacking: Enumeration

Focused View

Dale Meredith

2:34:22

88 View
  • 1. Course Overview.mp4
    01:54
  • 1. Overview - Some Things to Note.mp4
    03:35
  • 2. CEH Exam Study Guide.mp4
    04:24
  • 3. Enumeration Explained.mp4
    03:29
  • 4. The Techniques of Enumeration.mp4
    05:14
  • 5. Learning Check.mp4
    01:08
  • 1. Enumerating via Defaults and NetBIOS.mp4
    06:26
  • 2. What Is NetBIOS A Quick Review.mp4
    01:53
  • 3. Demo - Using Built-in Commands.mp4
    06:58
  • 4. Demo - Using nmap.mp4
    03:51
  • 5. Demo - Pulling SIDs and User Accounts.mp4
    06:21
  • 6. Microsoft Tools to Enumerate.mp4
    04:53
  • 7. Demo - NetBIOS Enumerator.mp4
    02:55
  • 8. Learning Check.mp4
    02:29
  • 1. Capture SNMP Enumeration.mp4
    06:52
  • 2. MIBs.mp4
    02:09
  • 3. Demo - Enumerations via SNMP.mp4
    02:00
  • 4. Learning Check.mp4
    01:17
  • 1. LDAP Enumeration.mp4
    06:58
  • 2. Demo - Using Jxplorer.mp4
    04:10
  • 3. Learning Check.mp4
    01:12
  • 1. NTP Enumeration.mp4
    03:33
  • 2. Diving into NFS Enumeration.mp4
    02:39
  • 3. Learning Check.mp4
    00:49
  • 1. SMTP Enumeration Explained.mp4
    06:54
  • 2. Demo - Using NetScanPro to Enumerate.mp4
    03:01
  • 3. Demo - Using smtp-user-enum.mp4
    01:17
  • 4. Learning Check.mp4
    00:54
  • 1. Employing DNS Enumeration.mp4
    04:54
  • 2. Behind DNS.mp4
    04:13
  • 3. Demo - Using NSLookup and DNSRecon.mp4
    05:21
  • 4. Learning Check.mp4
    00:55
  • 1. Enumerating IPSec.mp4
    04:29
  • 2. VoIP Enumeration.mp4
    01:54
  • 3. Using RPC Enumeration.mp4
    01:23
  • 4. Using Telnet, SMB, FTP, and More.mp4
    06:41
  • 5. Why is Linux Considered Secure.mp4
    02:03
  • 6. Demo - Enumerating Linux.mp4
    06:37
  • 7. Learning Check.mp4
    01:13
  • 1. Enumeration Countermeasures.mp4
    09:26
  • 2. Learning Check.mp4
    02:40
  • 1. Domain Summary.mp4
    03:18
  • Description


    The third phase attackers perform on a target is enumerating accounts and services. This course will teach you skills attackers use for enumeration that needed for the Certified Ethical Hacking exam.

    What You'll Learn?


      To truly compromise a system, making sure you know what OS, accounts, and services that are running is key. In this course, Ethical Hacking: Enumeration, you’ll learn to identify accounts and services through enumeration. First, you’ll explore how to use NetBIOS to expose intel. Next, you’ll discover how to use LDAP to expose user accounts and other protocols to complete your enumeration tasks. Finally, you’ll learn the countermeasures to thwart enumeration attacks. When you’re finished with this course, you’ll have the skills and knowledge of enumeration techniques needed for the Certified Ethical Hacking exam.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Dale Meredith
    Dale Meredith
    Instructor's Courses
    Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale's expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material. Straddling the line of fun and function, Dale's instruction is memorable and entertaining. Dale's knowledge and understanding of current trends in technology and applications have led to many opportunities, such as: training various Inc 500 companies, universities, and Divisions of the Department of Homeland Security for the United States government. Along with authoring for Pluralsight, consulting, and IT classroom training, you can catch Dale on stage speaking at IT conferences, helping IT teams keep their companies safe, relevant, and "breach" aware. Outside of the professional sphere, Dale spends quite a bit of his time giving back by speaking at adult and youth non-profit community gatherings and posting on his 'Dale Dumbs IT Down' social media sites. Dale uses these speaking engagements and social media sites to 'Dumb Down IT' concepts with the intent to help everyone be safe and smart with their technology and personal devices. Dale also specializes in Active Directory, Exchange Server, IIS, PowerShell, SharePoint, System Center/Desktop Deployment, and Private Cloud
    Pluralsight, LLC is an American privately held online education company that offers a variety of video training courses for software developers, IT administrators, and creative professionals through its website. Founded in 2004 by Aaron Skonnard, Keith Brown, Fritz Onion, and Bill Williams, the company has its headquarters in Farmington, Utah. As of July 2018, it uses more than 1,400 subject-matter experts as authors, and offers more than 7,000 courses in its catalog. Since first moving its courses online in 2007, the company has expanded, developing a full enterprise platform, and adding skills assessment modules.
    • language english
    • Training sessions 42
    • duration 2:34:22
    • level average
    • English subtitles has
    • Release Date 2023/01/08

    Courses related to Ethical Hacking