Ethical Hacking: Scanning and Enumeration
0.0 (0 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
524 students enrolled

Ethical Hacking: Scanning and Enumeration

Scanning and Enumeration
0.0 (0 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
524 students enrolled
Created by Terrica Ashoor
Last updated 11/2018
English
English [Auto-generated]
Current price: $72.99 Original price: $104.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 1.5 hours on-demand video
  • 2 articles
  • 4 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Be able to do quick port scans on target machines
  • Be able to do heavy port scans on target machines
  • Be able to scan and enumerate services on common ports
  • Utilize a method for basic enumeration
Requirements
  • Be familiar with using Linux operating system
  • Be familiar with basic networking concepts
Description

What happens when you find a target machine with multiple open ports, but you have no idea where to begin or what tools to use to enumerate such ports? This course helps to build a method in scanning and enumerating such ports to make a way for easier exploitation. The course is for beginners who need that method in better building techniques to gather information in exploitation of the machine. 

Who this course is for:
  • Beginner ethical hackers. This is not an advanced course.
Course content
Expand all 23 lectures 01:39:09
+ Lab Setup
22 lectures 01:37:26
Lab Setup
00:03
FTP
02:13
FTP Enumeration Lab
08:36
SSH
01:48
SSH Enumeration Lab
01:58
Telnet
01:04
Telnet Enumeration Lab
04:24
SMTP
01:23
SMTP Enumeration Lab
05:55
DNS
02:27
DNS Enumeration Lab
04:43
HTTP
03:57
HTTP Enumeration Lab
26:28
RPCBIND
00:58
RPCBIND Enumeration Lab
01:55
NFS
02:06
NFS Enumeration Lab
04:47
SMB and NetBios
02:20
SMB and NetBios Enumeration Lab
06:29
Common Vulnerable Ports
00:06