In the enumeration module you will learn how to use the discovered services and protocols
running in your target network to gather more details and difficult to obtain intelligence
prior to the actual System Hacking phase.
This module is the last of the preliminary investigative phases in the hacking cycle and with
it ends the information gathering which will now empower us to narrow down our targets and start
planning our attacks against specific technologies and choose the appropriate hacking tools
we will learn about in the remainder of this course.
CCNA, CCNP R&S, CCNA Security, CCDA, CCDP, JNCIA, JNCIS-Sec, JNCIP-Sec, JNCIS-ENT, VCP-DCV, CEH (Certified Ethical Hacker)