When you want to penetrate a system for ethical reasons, does the system have open ports and services? does the system have default login credentials? does the system have vulnerabilities on a certain service? How do we extract this information and used them to gain access to the system
All these topics are covered in the workshop (Network services Enmuration).
Note: it is recommended to download Kali Linux before the workshop.