Ethical Hacking - Phase 1 - Reconnaissance
Offered By: Udemy
Course Description
Overview
What you'll learn:
- Examine and learn ethical hacking reconnaissance techniques
- Explore both active & passive footprinting
- Review Google Dorking techniques
Kali is a penetration testing Linux distribution created by Offensive Security. It holds a repository of multiple tools for security-related engineers including hacking wireless networks, web applications, databases, Reverse engineering, password crackers, and much more! As you can see, Kali is a versatile and powerful tool for anyone looking to do any cybersecurity-related work.
Keep in mind this is a basics course, which means this course is a beginner’s guide Ethical Hacking - Phase 1 – Reconnaissance. We will cover Active and Passive techniques, and the tools used to perform the information gathering and reconnaissance. The main purpose of information Gathering is getting to know the target systems. This is the first process in ethical hacking. Reconnaissance is a set of processes and techniques (Footprinting, Scanning & Enumeration) used to covertly discover and collect information about a target system.
The course is broken into three main sections, and an introduction section, and we wrap up with a project to ensure you understand the process of information gathering and reconnaissance. The goal is to provide you with basic knowledge to get you started so you can take it from there. Remember this is not a field that you have can walkthrough. You will have to grow and adapt as the environment changes.
Remember this is a basic overview of information gathering and reconnaissance, the hope is you get in, understand the principles. Work through the assignments and exercises to help solidify your understanding of the topics covered in this course.
Taught by
Arthur Salmon
Related Courses
Advanced Python Scripting for CybersecurityInfosec via Coursera Python for Command-and-control, Exfiltration and Impact
Infosec via Coursera Fundamentos del Internet de las cosas (IoT): Seguridad I
Galileo University via edX MSc Cyber Security
Coventry University via FutureLearn Cyber Incident Response
Infosec via Coursera