Ethical Hacking: Reconnaissance/Footprinting
Offered By: Pluralsight
Course Description
Overview
Reconnaissance/Footprinting is the first phase attackers perform. This course will teach you the skills attackers use, which is needed for the CEH Exam.
You’ve chosen your target, now it’s time to gain intel about your target without their knowledge. In this course, Ethical Hacking: Reconnaissance/Footprinting, you’ll learn how attackers start profiling your organization. First, you’ll explore the concept of reconnaissance/footprinting and why it’s such an important phase of attack. Next, you’ll discover how to use search engines and web services to give you a better picture of your target and their resources. Finally, you’ll learn how to use some of the industry's top tools to gather and document your findings. When you’re finished with this course, you’ll have the skills and knowledge of reconnaissance/footprinting needed for the Certified Ethical Hacker Exam.
You’ve chosen your target, now it’s time to gain intel about your target without their knowledge. In this course, Ethical Hacking: Reconnaissance/Footprinting, you’ll learn how attackers start profiling your organization. First, you’ll explore the concept of reconnaissance/footprinting and why it’s such an important phase of attack. Next, you’ll discover how to use search engines and web services to give you a better picture of your target and their resources. Finally, you’ll learn how to use some of the industry's top tools to gather and document your findings. When you’re finished with this course, you’ll have the skills and knowledge of reconnaissance/footprinting needed for the Certified Ethical Hacker Exam.
Syllabus
- Course Overview 2mins
- Describing Reconnaissance/Footprinting 28mins
- Using Search Engines against a Target 47mins
- Capturing Intel through Web Services 27mins
- Exploiting Social Media 22mins
- Acquiring Intel From Websites 28mins
- Derive Intel from Email 6mins
- Examining Whois and DNS for Intel 28mins
- Discovering Intel from Network Reconnaissance/Footprinting 13mins
- Employing Social Engineering Tactics 6mins
- Examining the Tools of Attackers and the Countermeasures 44mins
- Domain Summary 2mins
Taught by
Dale Meredith
Related Courses
Ethical Hacking: Footprinting and ReconnaissanceLinkedIn Learning Discovery with ADRecon
Pluralsight Ethical Hacking: Reconnaissance/Footprinting
Pluralsight Reconnaissance with Shodan
Pluralsight Reconnaissance with Sn1per
Pluralsight