YoVDO

Ethical Hacking: Footprinting and Reconnaissance

Offered By: LinkedIn Learning

Tags

Ethical Hacking Courses OSINT (Open Source Intelligence) Courses Social Engineering Courses DNS Courses VoIP (Voice over Internet Protocol) Courses VPN Courses Footprinting Courses Reconnaissance Courses Google Hacking Courses

Course Description

Overview

Learn the concepts, tools, and techniques behind footprinting: ethical hacking techniques for finding information about computers and the people they belong to.

Syllabus

Introduction
  • Scouting the target
  • What you should know
  • Hacking Ethically
Uncovering Information
  • Footprinting and Reconnaissance
  • Using Competitive Intelligence
  • Investigating Business Sites
  • Searching and Google Hacking
  • Employing Social Engineering
  • Gathering data on people
  • Tracking Online Reputation
Using Email and Websites
  • Harvesting Email Addreses
  • Examining Websites
  • Scraping Websites
  • Challenge: Mirroring a website
  • Solution: Mirroring a website
  • Monitoring websites
Searching the Network
  • Footprinting using DNS
  • Examining a Zone Transfer
  • Generating Domain Names
  • Determining the Path
  • Determining the Path
Discovering Reconnaissance tools
  • Using OSINT Tools
  • Investigating Email
  • Footprinting VoIP and VPNs
  • Going to the Dark Web
  • Exploring other footprinting tools
Footprinting Capstone
  • Conducting a Forensic Exercise
  • Examining an email
  • Diving into an email header
  • Verifying IP blocklists
Wrapping up the Recon
  • Guarding Social Media
  • Writing Footprinting Reports
  • Countering Footprinting
  • Next steps

Taught by

Lisa Bock

Related Courses

Ethical Hacking: Reconnaissance/Footprinting
Pluralsight
Ethical Hacking: Reconnaissance/Footprinting
Pluralsight
Complete Cyber Security Course: Go From Zero To Hero
Udemy
Learn Ethical Hacking: Beginner to Advanced
Udemy
Ethical Hacking - Phase 1 - Reconnaissance
Udemy