• last month
Assessment Methodologies: Footprinting & Scanning

This course covers Host and Network Fingerprinting and Scanning. In this course, you will learn about different methods for endpoint detection and identification. This is the first step for pentesters when they begin accessing the network.

It emulates the tactics and techniques used by adversaries. It can also be valuable for resource inventory auditing and vulnerability management operations. All cyber security professionals should be familiar with these steps as they set an understanding for mitigation and management of resources.

#eJPT

Full Playlist:
https://dailymotion.com/playlist/x8tys8

Recommended