Ethical Hacking: Enumeration
This course reviews the concept of enumeration. Enumeration is the process of identifying resources on a network, and extracting information from a system. Techniques for retrieving information such as usernames, sharenames, network information and other vital pieces of information will be discussed.
What you will learn:
- Explain what enumeration is
- Summarize points of weakness and ports of interest for conducting enumeration
- Describe how NetBios works
- Explain how enumeration works in Unix and Linux system
This course is part of the following course program:
Hacking Your Company: Ethical Solutions to Defeat Cyber Attacks
Courses included in this program
Who should attend: Electrical Engineer, Software Engineer, Design Engineer, AI/ML Engineer, Computer Engineer, Systems Engineer, Communications, Product Engineer, Lead Engineer, Project Engineer, QA/Quality Engineer, IT Director/Manager/Consultant/Auditor, Security Consultant/Manager, Security Auditor/Architect, Security Systems Engineer, Chief Information Security Officer, Chief Compliance/Privacy/Risk Officer, Network Specialist/Analyst/Manager/Architect/Consultant/Administrator, Technical Support Engineer, Systems Analyst/Administrator
Sean Oriyano is a seasoned security professional and entrepreneur. Over the past 25 years he has split his time between writing, researching, consulting and training various people and organizations on a wide range of topic relating to both IT and security. As an instructor and consultant Sean has traveled to all different places all over the world sharing his knowledge as well as gaining exposure to many different environments and cultures along the way. His broad knowledge and easy to understand manner, with a healthy dose of humor, have led to Sean being a regularly requested instructor.
Outside of training and consulting Sean is also a best-selling author with many years experience in both digital and print media. Sean has published books for McGraw-Hill, Wiley, Sybex, O'Reilly Media and Jones & Bartlett. Over the last decade Sean has also expanded his reach even further by appearing on shows in both TV and radio. To date, Sean has appeared in over a dozen TV programs and radio shows discussing different cyber security topics and technologies.
Outside his own business activities Sean is a member of the military as a Chief Warrant Officer specializing in infrastructure and security as well as the development of new troops. Additionally, as a CWO he is recognized as a Subject Matter Expert in his field and is frequently called upon to provide expertise, training and mentoring wherever needed.
When not working Sean is an avid Obstacle Course Racer having completed numerous races, a world championship race and a Spartan Trifecta. He also enjoys traveling, bodybuilding, training and MMA.
Publication Year: 2016