Performing and Analyzing Network Reconnaissance
Pluralsight
Course Summary
Seeing what is currently being exposed about your networks and company resources is vital. This course will provide a fundamental understanding of both reconnaissance and scanning and how it can affect your security posture.
-
+
Course Description
You've been tasked as an "Incident Handler" and you are wondering where you start. Attackers typically start with doing a little "reconnaissance" of their target, so it only makes sense that you start there as well. In this course, Performing and Analyzing Network Reconnaissance, you will learn how to think like an attacker in order to stay a step ahead of one. First, you will learn about the two different steps of reconnaissance and scanning. Next, you will learn what to look for, how it's done, and what you can do to protect your infrastructures. Finally, you will learn about tools you can use that the attacker will use against you. By the end of this course, you'll know how to look at your infrastructure the same way attackers do, and understand the process to minimize those threats.
-
+
Course Syllabus
Course Overview- 2m 15s
—Course Overview 2m 15sThe Two Steps- 35m 25s
—Introduction 7m 15s
—Let's Talk About Reconnaissance 5m 20s
—What's Your Goal Here? 2m 39s
—What You'll Learn and Why 4m 5s
—Let's Talk About Some Stipulations 4m 35s
—The Trends Today 8m 51s
—Summary 2m 37sInitially What Do You Look For?- 44m 45sThe More You Look, the More You Find- 40m 53sOther Reconnaissance Techniques- 38m 30sReconnaissance via Google Hacking- 40m 35sLet's Not Forget PowerShell- 55m 16sOverview of Scanning- 22m 48sUnderstanding the 3-way Handshake- 21m 8sChecking for 'Live' Systems and Their Open Ports- 32m 6sTypes of Scanning- 44m 19sBanner Grabbing and OS Fingerprinting- 30m 5sMore Tools for the Utility-belt- 18m 9sThreats from Wireless- 18m 23s