479403 637199540833532599 16x9 2
Size: 262 MB

Ethical hacking is one of the most desired stills for any IT security professional. White hat hackers can detect, prevent, and mitigate network intrusions and data theft: a critical liability for any company that does business online or in the cloud. This course introduces to the concept of enumeration—identifying the resources on a host or network, including user names, ports and services, policies, and more. It covers protocol, process, and service enumeration on Windows and Linux, and maps to the Enumeration competency from the Certified Ethical Hacker (CEH) body of knowledge. Malcolm discusses host profiling, enumerating protocols (such as SMB, RPC, and SNMP), and enumerating the Internet, and concludes with demos of third-party tools organizations can use to mitigate risk, including SuperScan, NetScan Pro, and JXplorer.

Topics include:

  • What is enumeration?
  • Understanding NetBIOS, SMB, SAMBA, and RPC
  • Profiling hosts
  • Investigating interfaces
  • Enumerating SMB
  • Enumerating SNMP and RPC
  • Enumerating the Internet
  • Working with other enumeration tools

HOMEPAGE – https://www.lynda.com/Linux-tutorials/Ethical-Hacking-Enumeration/479403-2.html

Free Download Links-

Note: Comment below if you find the download links dead and comment with fake or temporary Email-id is going to be ignored.

You May Also Like

580651 637199625246067279 16x9 3
Securing the IoT: Designing and Testing
642487 637233569875247790 16x9 1 3
Ransomware: Practical Reverse Engineering
2822584 637239173796664261 16x9 2
Lynda – SQL Server Machine Learning Services: R
Categories: CoursesSecurity

2 Comments

Yahiko · April 21, 2022 at 3:43 pm

Link is expired broozzz

Leave a Reply

Your email address will not be published. Required fields are marked *