MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

Ethical Hacking: Reconnaissance/Footprinting

Course Summary

This course starts you at the first phase (out of 5) of hacking. You'll begin the process of probing a system with the intent of attacking and compromising the target. This phase consists of either passively or actively acquiring evidence about a target. The goal is to gather as much data as possible about a would-be target with the goal of getting ample data to make future attacks easier and more directed. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking


  • +

    Course Syllabus

    What Do You Mean by Reconnaissance/Footprinting?
    - 27m 32s

    —What Do You Mean by Reconnaissance/Footprinting? 3m 37s
    —Why Recon? 3m 28s
    —More Reasons Why We Recon 2m 36s
    —Types of Recon 4m 13s
    —Goals of Recon 9m 40s
    —Tools of Recon 2m 50s
    —Summary 1m 6s
    Initially What Do You Look For?
    - 44m 45s

    —Initially What Do You Look For? 1m 56s
    —Using Search Engines 4m 31s
    —Using Websites 11m 7s
    —Using Whois 8m 31s
    —Using PING & DNS 4m 59s
    —Continuing to Use DNS 6m 23s
    —Some Advanced DNS Tricks 5m 55s
    —Summary 1m 19s
    The More You Look, the More You Find
    - 31m 23s
    Other Reconnaissance Techniques
    - 38m 29s
    Reconnaissance via Google Hacking
    - 40m 35s
    Reconnaissance Countermeasures & Pen Testing
    - 26m 15s


Course Fee:
USD 29

Course Type:

Self-Study

Course Status:

Active

Workload:

1 - 4 hours / week

Attended this course?

Back to Top

 
Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top