Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LinkedIn Learning

Ethical Hacking: Enumeration

via LinkedIn Learning


Learn about the basic methods of enumerating networks and target systems using the standard ethical hacking enumeration tools.


  • Starting your testing with enumeration
  • What you need to know
  • Disclaimer
1. Basics of Enumeration
  • What is enumeration?
  • Understanding contexts
  • Working with contexts
  • Understanding NetBIOS, SMB, SAMBA, and RPC
2. Local Host Enumeration
  • Profiling a Unix host
  • Profiling a Windows host
  • Investigating the Windows network interface
  • Investigating the Linux network interface
3. Enumeration Remote Hosts
  • Enumerating host services
  • Enumerating SMB from Linux: Episode 1
  • Enumerating SMB from Linux: Episode 2
  • Enumerating SMB from Linux: Episode 3
  • Enumerating SMB from Windows: Episode 1
  • Enumerating SMB from Windows: Episode 2
  • Enumerating using SNMP
  • Enumerating with RPC
  • Using WMI to enumerate Windows
  • Enumeration using Finger
  • Remote enumeration using PowerShell
4. Enumerating Web Apps
  • What is that web server?
  • Enumerating a website with Nikto
  • Enumerating webpages
  • Enumerating hidden webpages
5. Enumerating the Internet
  • Tracing routes across the internet routes
  • Using Shodan
  • Scan the internet with ZMap
6. Enumerating Cloud
  • Enumeration of the cloud
  • Enumerating cloud policies
  • Enumerating cloud compute resources
  • Enumerating cloud storage resources
7. Other Enumeration
  • Scanning with SuperScan
  • Scanning with NetScanTools Pro
  • Enumerating LDAP
  • Checking for SMTP users
  • Next steps

Taught by

Malcolm Shore


4.6 rating at LinkedIn Learning based on 44 ratings

Start your review of Ethical Hacking: Enumeration

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.