Footprinting, Scanning, and Enumeration
This course is included in our On-demand training solution.
Gathering information about a company, its network, and the servers, services, and ports that it uses and has open is a very important part of preparing for an attack on a network; but it is also tremendously important for an ethical hacker to take the same steps and to find the same weaknesses. This course will examine the steps taken to gather information, find a network range, network scanning and tools, enumeration techniques, and the countermeasures used against all of these. This course also assists students who are preparing for the EC Councils Ethical Hacking and Countermeasures (CEHv6) exam 312-50.
Existing or in-training IT security professionals seeking detailed security penetration testing skills
A technical background with a solid understanding of networks and networking concepts, such as TCP/IP, IP Routing, and LAN Switching, as well as Windows and/or UNIX/LINUX operating systems; a general familiarity with the principles and usage of command-line, coding, and GUI-based technologies for manipulating IT operating systems
Finding a Network Range
Scanning Methodology and Techniques
Pre-attack Intelligence Gathering
Windows Architecture and Security
NetBIOS and SNMP Enumeration
DNS and AD Enumeration