Information Gathering with Kali Linux
Offered By: Pluralsight
Course Description
Overview
This course is all about introducing the learner to the 01 Information Gathering section of Kali . You'll learn about about a few of the tools available on the Kali platform and how they can be used to gather key information on your target.
Whether you work on the blue team within your company or are hired as a red teamer to help harden a company’s defense, knowing what vulnerabilities you are broadcasting to the world is important. In this course, Information Gathering with Kali Linux, you’ll learn to run the information gathering set of tools to conduct the reconnaissance step in the cyber kill chain. First, you will explore tools for conducting DNS Analysis and host identification. Then, you'll learn about network discovery and OSINT analysis. Finally, you will go through how to use that information to conduct a social engineering attack. When you’re finished with this course, you will have the skills and knowledge to conduct proper information gathering of assets and resources openly broadcasted to the world needed to lockdown, harden, and secure your company in today’s cyber world.
Whether you work on the blue team within your company or are hired as a red teamer to help harden a company’s defense, knowing what vulnerabilities you are broadcasting to the world is important. In this course, Information Gathering with Kali Linux, you’ll learn to run the information gathering set of tools to conduct the reconnaissance step in the cyber kill chain. First, you will explore tools for conducting DNS Analysis and host identification. Then, you'll learn about network discovery and OSINT analysis. Finally, you will go through how to use that information to conduct a social engineering attack. When you’re finished with this course, you will have the skills and knowledge to conduct proper information gathering of assets and resources openly broadcasted to the world needed to lockdown, harden, and secure your company in today’s cyber world.
Syllabus
- Course Overview 1min
- Introduction 6mins
- DNS Analysis 16mins
- OSINT Analysis 15mins
- Conduct Social Engineering Attack 8mins
- Live Host Identification 9mins
- Network Discovery, Port, and Protocol Analysis 17mins
Taught by
Mike Woolard
Related Courses
Hacking and PatchingUniversity of Colorado System via Coursera Information security - IV
Indian Institute of Technology Madras via Swayam Cisco CCNA 200-301 Complete Course: Packet Tracer Labs
Udemy Cybersecurity Fundamentals: Architecting a Solution
Udemy Network Ethical Hacking for beginners (Kali - Hands-on)
Udemy