Performing and Analyzing Network Reconnaissance
Offered By: Pluralsight
Course Description
Overview
Seeing what is currently being exposed about your networks and company resources is vital. This course will provide a fundamental understanding of both reconnaissance and scanning and how it can affect your security posture.
You've been tasked as an "Incident Handler" and you are wondering where you start. Attackers typically start with doing a little "reconnaissance" of their target, so it only makes sense that you start there as well. In this course, Performing and Analyzing Network Reconnaissance, you will learn how to think like an attacker in order to stay a step ahead of one. First, you will learn about the two different steps of reconnaissance and scanning. Next, you will learn what to look for, how it's done, and what you can do to protect your infrastructures. Finally, you will learn about tools you can use that the attacker will use against you. By the end of this course, you'll know how to look at your infrastructure the same way attackers do, and understand the process to minimize those threats.
Topics:
You've been tasked as an "Incident Handler" and you are wondering where you start. Attackers typically start with doing a little "reconnaissance" of their target, so it only makes sense that you start there as well. In this course, Performing and Analyzing Network Reconnaissance, you will learn how to think like an attacker in order to stay a step ahead of one. First, you will learn about the two different steps of reconnaissance and scanning. Next, you will learn what to look for, how it's done, and what you can do to protect your infrastructures. Finally, you will learn about tools you can use that the attacker will use against you. By the end of this course, you'll know how to look at your infrastructure the same way attackers do, and understand the process to minimize those threats.
Topics:
- Course Overview
- The Two Steps
- Initially What Do You Look For?
- The More You Look, the More You Find
- Other Reconnaissance Techniques
- Reconnaissance via Google Hacking
- Let's Not Forget PowerShell
- Overview of Scanning
- Understanding the 3-way Handshake
- Checking for 'Live' Systems and Their Open Ports
- Types of Scanning
- Banner Grabbing and OS Fingerprinting
- More Tools for the Utility-belt
- Threats from Wireless
Taught by
Dale Meredith
Related Courses
Credential Access with Cain & AbelPluralsight Ethical Hacking: SQL Injection
Pluralsight Nmap - Beginners Course
Udemy