Ethical Hacking: Enumeration (eVideo, 2021) []
skip to content
Ethical Hacking: Enumeration Preview this item
ClosePreview this item

Ethical Hacking: Enumeration

Author: Malcolm Shore; Linkedin (Firm),
Publisher: Carpenteria, CA, 2021.
Edition/Format:   eVideo : Clipart/images/graphics : EnglishView all editions and formats
Learn about the basic methods of enumerating networks and target systems using the standard ethical hacking enumeration tools.

based on 1 rating(s) 1 with a review

More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...


Genre/Form: Educational films
Instructional films
Material Type: Clipart/images/graphics, Internet resource, Videorecording
Document Type: Internet Resource, Computer File, Visual material
All Authors / Contributors: Malcolm Shore; Linkedin (Firm),
OCLC Number: 1258266291
Cast: Presenter: Malcolm Shore.
Description: 1 online resource
Responsibility: with Malcolm Shore.


Learn about the basic methods of enumerating networks and target systems using the standard ethical hacking enumeration tools.

Enumeration is designed for ethical hackers who want to build their skills in reconnaissance of targets and in optimizing their penetration testing. In this course, instructor Malcolm Shore teaches the basic methods of enumerating networks and targeting systems with common enumeration tools. Malcolm explains what enumeration is and gives you opportunities in the course for hands-on experience. He covers enumeration for local and remote hosts. Malcolm discusses how to enumerate web apps, the internet, and cloud resources. He also goes over how to use tools like SuperScan, NetScanTools Pro, Nmap, JXplorer, and more.


User-contributed reviews

WorldCat User Reviews (1)


by TRAVISKY (WorldCat user published 2021-10-13) Excellent Permalink

I know a real professional "Tech Crown Hacker" who has worked for me once in this past month. He is very good at hacking. He offers legit services such as clearing of bad records online without it being traced backed to you, he clone phones, hack Facebook, Instagram, whatsapp, emails, twitter, bank...
Read more... 

  • 0 of 1 people found this review helpful. Did it help you? 
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...


All user tags (2)

View most popular tags as: tag list | tag cloud

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.