Scanning, Enumeration, and Vulnerabilities

0
Language

Level

Beginner

Access

Paid

Certificate

Paid

This course covers basic scanning, enumeration, and vulnerability scanning as part of a penetration test.

Add your review

Course Description

Attackers use scanning and enumeration to determine what live systems are on the network (host discovery) and additional information about those systems, like the operating system in use and software version. With vulnerability scanning, an attacker attempts to locate specific weaknesses in system software. Specifically, the attacker is hoping to find known vulnerabilities (CVE) that they can easily exploit. This course is designed to be predominantly hands-on and covers the theory of scanning, enumeration, and vulnerabilities at a high-level.

Attackers use scanning and enumeration to determine what live systems are on the network (host discovery) and additional information about those systems, like the operating system in use and software version. With vulnerability scanning, an attacker attempts to locate specific weaknesses in system software. Specifically, the attacker is hoping to find known vulnerabilities (CVE) that they can easily exploit. This course is designed to be predominantly hands-on and covers the theory of scanning, enumeration, and vulnerabilities at a high-level.

Module 1: Introduction

Module 2: Check for Live Systems & Ports

Module 3: Scanning

Module 4: Fingerprinting & Banner Grabbing

Module 5: Enumeration Tools

Module 6: Vulnerabilities

Module 7: Conclusion

User Reviews

0.0 out of 5
0
0
0
0
0
Write a review

There are no reviews yet.

Be the first to review “Scanning, Enumeration, and Vulnerabilities”

×

    Your Email (required)

    Report this page
    Scanning, Enumeration, and Vulnerabilities
    Scanning, Enumeration, and Vulnerabilities
    LiveTalent.org
    Logo
    Skip to content