YoVDO

Footprinting Techniques for Offensive Security

Offered By: YouTube

Tags

Footprinting Courses Cybersecurity Courses Network Security Courses Security Assessment Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore an in-depth conference talk on footprinting techniques in cybersecurity. Delve into various subtopics, including DNS analysis, zone transfers, and Whois lookups. Learn about the importance of footprinting in security assessments and discover practical Linux-based tools and methods. Gain insights into DNS record types, list scanning, and account verification. Follow along with live demonstrations and real-world examples to enhance your understanding of these critical reconnaissance techniques.

Syllabus

Intro
About me
Class structure
Whats out there
Subtopics
Why Footprinting
Disclaimer
Linux
DNS
DNS lookup
Types of records
Finding DNS records
Dig
Zone Transfer
Linux Zone Transfer
Other Techniques
List Scan
Whois
Whois Demo
Looking up information
Traceroute
Finding
Checking Accounts


Related Courses

An Introduction to Computer Networks
Stanford University via Independent
Computer Networks
University of Washington via Coursera
Computer Networking
Georgia Institute of Technology via Udacity
Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Model Building and Validation
AT&T via Udacity