CompTIA PenTest+: Applying Enumeration Techniques
CompTIA PenTest+
| Intermediate
- 15 videos | 1h 24m 30s
- Includes Assessment
- Earns a Badge
Penetration testing enumeration is a critical phase in the process of assessing the security posture of a system or network. It involves systematically gathering information about the target environment to identify potential vulnerabilities and entry points for exploitation. In this course, explore enumeration techniques such as service discovery and protocol, DNS, and directory enumeration, as well as local user, email, and permission enumeration techniques. Next, learn about secrets enumeration, including cloud access keys, passwords, API keys, and session tokens, and discover how attack path mapping can gather information about a target. Finally, examine enumeration techniques involving web application firewalls (WAFs), web crawling processes, and manual enumeration. This course is one of a collection that helps prepare learners for the CompTIA PenTest+ (PT0-003) certification exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseOutline details of operating system (os) fingerprintingIdentify how service discovery is used to automatically detect devices and services on a computer networkDifferentiate between protocol, dns, and directory enumerationPerform host discovery using nmapRecognize how to enumerate server message block (smb) services on a target machineOutline how to perform local user enumerationIdentify how to perform email and permission-based enumeration
-
Outline details of wireless scanning and enumerationRecognize details of secrets enumeration, including cloud access keys, passwords, api keys, and session tokensIdentify details of attack path mapping and how it can be used to gather information about a targetOutline how to use web application firewall (waf) enumerationRecognize the web crawling techniques used to gather information about a target systemIdentify how to perform manual enumeration using robots.txt, sitemaps, and platform pluginsSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 34sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
8m 28sUpon completion of this video, you will be able to outline details of operating system (OS) fingerprinting. FREE ACCESS
-
3m 34sAfter completing this video, you will be able to identify how service discovery is used to automatically detect devices and services on a computer network. FREE ACCESS
-
6m 55sIn this video, we will differentiate between protocol, DNS, and directory enumeration. FREE ACCESS
-
9m 3sDiscover how to perform host discovery using Nmap. FREE ACCESS
-
4m 45sThrough this video, you will recognize how to enumerate server message block (SMB) services on a target machine. FREE ACCESS
-
5m 46sAfter completing this video, you will be able to outline how to perform local user enumeration. FREE ACCESS
-
6m 34sIn this video, we will identify how to perform email and permission-based enumeration. FREE ACCESS
-
8m 56sUpon completion of this video, you will be able to outline details of wireless scanning and enumeration. FREE ACCESS
-
8m 55sThrough this video, you will be able to recognize details of secrets enumeration, including cloud access keys, passwords, API keys, and session tokens. FREE ACCESS
-
4m 55sDuring this video, we will identify details of attack path mapping and how it can be used to gather information about a target. FREE ACCESS
-
3m 34sAfter completing this video, you will be able to outline how to use web application firewall (WAF) enumeration. FREE ACCESS
-
4m 15sThrough this video, you will recognize the web crawling techniques used to gather information about a target system. FREE ACCESS
-
6m 24sUpon completion of this video, you will be able to identify how to perform manual enumeration using robots.txt, sitemaps, and platform plugins. FREE ACCESS
-
51sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.