Ethical Hacking: Recon and Footprinting
Overview
- Completion Certificate awarded upon completion to show employers your new skills
- Free upgrade on to our state of the art platform
- Career Advice available on completion
- 12 Months unlimited Access
Ethical Hacking: Recon and Footprinting
With this Ethical Hacking: Recon and Footprinting training course, you will learn all about web site analysis performance and attack methods.
This course is for both beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! There are currently over a million Cyber Security job openings globally, and demand is greatly outpacing supply – which means more opportunity, job security, and higher pay for you!
What is Recon and Footprinting?
Footprinting and Recon (Reconnaissance) go hand-in-hand in terms of cyber security. The attack surface of a system, network, or organization is referred to as the footprint. Determining that footprint and covertly collecting information on the target is referred to as recon. The process of footprinting and recon is often used early in an attack by penetration testers.
Course Outline
By purchasing this course, you will learn the following:
1. Recon and Footprinting |
Website and E-Mail Footprinting (4:11) |
Port Inspection with Netstat (3:03) |
Nmap and Metasploit (2:32) |
Maltego (5:24) |
Who is and Nslookup (3:06) |
Shodan and IoT Enumeration (3:22) |
NTP Enumeration (1:16) |
Probing SNMP (2:25) |
Inspecting SMTP (0:35) |
SMB Discovery (2:04) |
Commonly used network ports and protocols (14:06) |
Requirements
Our training works on all devices including Mobile phones, IPad’s, Android tablets, Macs and PC’s.