Ethical Hacking: Reconnaissance/Footprinting
Offered By: Pluralsight
Course Description
Overview
Reconnaissance/Footprinting is the first phase attackers perform. This course will teach you the skills attackers use, which is needed for the CEH Exam.
You’ve chosen your target, now it’s time to gain intel about your target without their knowledge. In this course, Ethical Hacking: Reconnaissance/Footprinting, you’ll learn how attackers start profiling your organization. First, you’ll explore the concept of reconnaissance/footprinting and why it’s such an important phase of attack. Next, you’ll discover how to use search engines and web services to give you a better picture of your target and their resources. Finally, you’ll learn how to use some of the industry's top tools to gather and document your findings. When you’re finished with this course, you’ll have the skills and knowledge of reconnaissance/footprinting needed for the Certified Ethical Hacker Exam.
You’ve chosen your target, now it’s time to gain intel about your target without their knowledge. In this course, Ethical Hacking: Reconnaissance/Footprinting, you’ll learn how attackers start profiling your organization. First, you’ll explore the concept of reconnaissance/footprinting and why it’s such an important phase of attack. Next, you’ll discover how to use search engines and web services to give you a better picture of your target and their resources. Finally, you’ll learn how to use some of the industry's top tools to gather and document your findings. When you’re finished with this course, you’ll have the skills and knowledge of reconnaissance/footprinting needed for the Certified Ethical Hacker Exam.
Syllabus
- Course Overview 2mins
- Describing Reconnaissance/Footprinting 28mins
- Using Search Engines against a Target 47mins
- Capturing Intel through Web Services 27mins
- Exploiting Social Media 22mins
- Acquiring Intel From Websites 28mins
- Derive Intel from Email 6mins
- Examining Whois and DNS for Intel 28mins
- Discovering Intel from Network Reconnaissance/Footprinting 13mins
- Employing Social Engineering Tactics 6mins
- Examining the Tools of Attackers and the Countermeasures 44mins
- Domain Summary 2mins
Taught by
Dale Meredith
Related Courses
Ethical HackingIndian Institute of Technology, Kharagpur via Swayam Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax MSc Cyber Security
Coventry University via FutureLearn Network Security - Introduction to Network Security
New York University (NYU) via edX Network Security - Advanced Topics
New York University (NYU) via edX