Tags
Language
Tags
September 2025
Su Mo Tu We Th Fr Sa
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 1 2 3 4
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Lynda - Ethical Hacking: Enumeration

    Posted By: U.N.Owen
    Lynda - Ethical Hacking: Enumeration

    Lynda - Ethical Hacking: Enumeration
    Size: 301 MB | Duration: 1h 42m | Video: AVC (.mp4) 1280x720 15&30fps | Audio: AAC 48KHz 2ch
    Genre: eLearning | Level: Intermediate | Language: English

    Ethical hacking is one of the most desired stills for any IT security professional. White hat hackers can detect, prevent, and mitigate network intrusions and data theft: a critical liability for any company that does business online or in the cloud. This course introduces to the concept of enumeration—identifying the resources on a host or network, including user names, ports and services, policies, and more. It covers protocol, process, and service enumeration on Windows and Linux, and maps to the Enumeration competency from the Certified Ethical Hacker (CEH) body of knowledge. Malcolm discusses host profiling, enumerating protocols (such as SMB, RPC, and SNMP), and enumerating the Internet, and concludes with demos of third-party tools organizations can use to mitigate risk, including SuperScan, NetScan Pro, and JXplorer. An overview of the CEH exam, blueprint, and eligibility criteria can be found at https://www. eccouncil. org/programs/certified-ethical-hacker-ceh/.

    * What is enumeration?
    * Understanding NetBIOS, SMB, SAMBA, and RPC
    * Profiling hosts
    * Investigating interfaces
    * Enumerating SMB
    * Enumerating SNMP and RPC
    * Enumerating the Internet
    * Working with other enumeration tools


    Lynda - Ethical Hacking: Enumeration

    No mirrors below please.