[Pluralsight] Ethical Hacking: Enumeration

ReleaseDate“: “2015-09-03”,
Level“: “Beginner”,

ShortDescription“: “Now that we’ve found out \”live\” systems and hopefully determined the OS by fingerprinting, our next phase of Ethical Hacking is to now extrapolate data such as usernames, computer names, network share, and more. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking”,

Description“: “Enumeration is the first official attack at your target. Enumeration is the process of gathering information that might include user names, computer names, network shares, services running, and other possible points of entry. This course we’ll show different techniques that can be used against your network. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking”,

DurationInMilliseconds“: 10799000,
HasTranscript“: 1,
AuthorsFullnames“: “Dale Meredith ”

Size: 366.25M





2 Comments

  1. Darkvader November 30, 2017 Reply
  2. FCO January 3, 2018 Reply

Add a Comment

Your email address will not be published. Required fields are marked *