Network & Security

Ethical Hacking: Scanning and Enumeration

Ethical Hacking

Ethical Hacking: Scanning and Enumeration

Ethical Hacking: Scanning and Enumeration

Scanning and Enumeration

What you’ll learn :
  • Be able to do quick port scans on target machines
  • Be able to do heavy port scans on target machines
  • Be able to scan and enumerate services on common ports
  • Utilize a method for basic enumeration
Requirements :
  • Be familiar with using Linux operating system
  • Be familiar with basic networking concepts
Description :

What happens when you find a target machine with multiple open ports, but you have no idea where to begin or what tools to use to enumerate such ports? This course helps to build a method in scanning and enumerating such ports to make a way for easier exploitation. The course is for beginners who need that method in better building techniques to gather information in exploitation of the machine.

Who this course is for :
  • Beginner ethical hackers. This is not an advanced course.
Created by Terrica Ashoor
Last updated 11/2018
 English [Auto-generated]


Google Drive


Show More

Related Articles


  1. Hi. I have checked your and i see you’ve got some duplicate content so probably it is the reason that
    you don’t rank hi in google. But you can fix this issue
    fast. There is a tool that generates articles like human, just search in google:
    miftolo’s tools

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button

Adblock Detected

Please consider supporting us by disabling your ad blocker