[FreeCoursesOnline.Me] Pluralsight - Ethical Hacking Enumeration

Torrent Details


[FreeCoursesOnline.Me] Pluralsight - Ethical Hacking Enumeration

NAME
[FreeCoursesOnline.Me] Pluralsight - Ethical Hacking Enumeration.torrent
CATEGORY
Other
INFOHASH
85f9a940171a8a2d9a86fdea2085b30282ec43db
SIZE
349 MB in 35 files
ADDED
Uploaded on 25-12-2021 by our crawler pet called "Spidey".
SWARM
0 seeders & 0 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description

Lynda and other Courses >>> https://www.freecoursesonline.me/

Forum for discussion >>> https://1hack.us/








Created by: Dale Meredith

Language: English

Updated: Dec 3, 2021

Duration: 2h 58m

Course Source: https://www.pluralsight.com/courses/enumeration-ethical-hacking-ceh-cert



About



The third phase attackers perform on a target is enumerating accounts and services. This course will teach you skills attackers use for enumeration that needed for the Certified Ethical Hacking exam.



Description



To truly compromise a system, making sure you know what OS, accounts, and services that are running is key. In this course, Ethical Hacking: Enumeration, you’ll learn to identify accounts and services through enumeration. First, you’ll explore how to use NetBIOS to expose intel. Next, you’ll discover how to use LDAP to expose user accounts and other protocols to complete your enumeration tasks. Finally, you’ll learn the countermeasures to thwart enumeration attacks. When you’re finished with this course, you’ll have the skills and knowledge of enumeration techniques needed for the Certified Ethical Hacking exam.



Level



• Intermediate



About Author



Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale's expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material.






SIMILAR



TORRENT
 
UPLOADEDSIZESEEDS
LEECHS


Pluralsight | Cisco Enterprise Networks: Troubleshooting BGP and GRE Tunnels [FCO] by Prom3th3uS










9 months
280.31 MB15
2


Python for Data Analysis, 2nd Edition By Wes McKinney (2017) [AhLaN] by abidmail










1 year
8.98 MB14
2


O’REILLY | Go for Python Developers [FCO] by Prom3th3uS










7 months
392.94 MB17
1

Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
0. Websites you may like/How you can help our Group!.txt204 B
01. Course Overview/01. Course Overview.mp44.2 MB
02. Discussing Enumeration and the Techniques Used/02. Discussing Enumeration.mp49.5 MB
02. Discussing Enumeration and the Techniques Used/03. The Techniques of Enumeration.mp410.9 MB
02. Discussing Enumeration and the Techniques Used/04. Know Your Ports and Services.mp46.4 MB
03. Defaults and NetBIOS/05. Enumerating via Defaults and NetBIOS.mp414.3 MB
03. Defaults and NetBIOS/06. What Is NetBIOS - A Review.mp42.7 MB
03. Defaults and NetBIOS/07. Demo-Using Built-in Commands.mp412.2 MB
03. Defaults and NetBIOS/08. Demo-Using nmap.mp47.7 MB
03. Defaults and NetBIOS/09. Demo-Pulling SIDs and User Accounts.mp411.1 MB
03. Defaults and NetBIOS/10. Microsoft Tools for Enumeration...Wait What.mp46.7 MB
03. Defaults and NetBIOS/11. NetBIOS Enumeration and SuperScan.mp415.7 MB
04. Capture SNMP Enumeration/12. Capture SNMP Enumeration.mp415.6 MB
04. Capture SNMP Enumeration/13. MIBs - I Make This Look Good.mp45.4 MB
04. Capture SNMP Enumeration/14. Demo-Enumerating SNMP.mp419 MB
05. Demonstrating LDAP Enumeration/15. Demonstrating LDAP Enumeration.mp414.4 MB
05. Demonstrating LDAP Enumeration/16. Demo-Using Jxplorer and Hyena.mp425.7 MB
06. Examining NTP and NFS Enumeration/17. Examining NTP and NFS Enumeration.mp47 MB
06. Examining NTP and NFS Enumeration/18. Demo-Using NTP Tools to Enumerate.mp48.7 MB
06. Examining NTP and NFS Enumeration/19. Diving into NFS Enumeration.mp42.9 MB
07. Exploring SMTP Enumeration/20. Exploring SMTP Enumeration.mp47.4 MB
07. Exploring SMTP Enumeration/21. Demo-Enumerating SMTP.mp413.4 MB
07. Exploring SMTP Enumeration/22. Demo-Enumerating Usernames.mp414.6 MB
08. Employing DNS Enumeration/23. Employing DNS Enumeration.mp48.4 MB
08. Employing DNS Enumeration/24. Behind DNS.mp47.6 MB
08. Employing DNS Enumeration/25. Demo-Using NSLookup and DNSRecon.mp420.3 MB
09. Acquiring Intel from Other Enumeration Techniques/26. Acquiring Intel from Other Enumeration Techniques.mp48 MB
09. Acquiring Intel from Other Enumeration Techniques/27. VoIP Enumeration.mp42.3 MB
09. Acquiring Intel from Other Enumeration Techniques/28. Using RPC Enumeration.mp43.4 MB
09. Acquiring Intel from Other Enumeration Techniques/29. Using Telnet SMB FTP and More.mp413.5 MB
09. Acquiring Intel from Other Enumeration Techniques/30. Why Is Linux Considered Secure NOT.mp46.7 MB
09. Acquiring Intel from Other Enumeration Techniques/31. Demo-Enumerating within Linux.mp413.9 MB
10. Discovering Enumeration Countermeasures/32. Countermeasures for Enumeration.mp419 MB
11. Domain Summary/33. Domain Summary.mp44.3 MB
Exercise Files.zip5.7 MB

Alternative Torrents for 'FreeCoursesOnline.Me Pluralsight Ethical Hacking Enumeration'.

There are no alternative torrents found.