Companies Home Search Profile

Ethical Hacking: Footprinting and Reconnaissance

Focused View

Lisa Bock

1:55:11

47 View
  • 01 - Scouting the target.mp4
    00:36
  • 02 - What you should know.mp4
    00:59
  • 03 - Hacking Ethically.mp4
    00:55
  • 01 - Footprinting and Reconnaissance.mp4
    03:46
  • 02 - Using Competitive Intelligence.mp4
    03:22
  • 03 - Investigating Business Sites.mp4
    04:08
  • 04 - Searching and Google Hacking.mp4
    04:37
  • 05 - Employing Social Engineering.mp4
    03:04
  • 06 - Gathering data on people .mp4
    03:54
  • 07 - Tracking Online Reputation .mp4
    04:44
  • 01 - Harvesting Email Addreses .mp4
    04:24
  • 02 - Examining Websites .mp4
    04:19
  • 03 - Scraping Websites .mp4
    04:07
  • 04 - Challenge Mirroring a website.mp4
    00:48
  • 05 - Solution Mirroring a website.mp4
    02:19
  • 06 - Monitoring websites.mp4
    03:02
  • 01 - Footprinting using DNS .mp4
    04:26
  • 02 - Examining a Zone Transfer.mp4
    03:50
  • 03 - Generating Domain Names .mp4
    04:29
  • 04 - Determining the Path.mp4
    04:20
  • 05 - Determining the Path.mp4
    03:55
  • 01 - Using OSINT Tools .mp4
    04:11
  • 02 - Investigating Email.mp4
    04:51
  • 03 - Footprinting VoIP and VPNs .mp4
    03:56
  • 04 - Going to the Dark Web .mp4
    02:41
  • 05 - Exploring other footprinting tools .mp4
    02:18
  • 01 - Conducting a Forensic Exercise.mp4
    02:33
  • 02 - Examining an email.mp4
    02:54
  • 03 - Diving into an email header.mp4
    04:03
  • 04 - Verifying IP blocklists.mp4
    03:49
  • 01 - Guarding Social Media.mp4
    04:11
  • 02 - Writing Footprinting Reports.mp4
    03:54
  • 03 - Countering Footprinting .mp4
    04:37
  • 04 - Next steps.mp4
    01:09
  • Description


    Ethical hackers use their knowledge for good: to test if an organization's network is vulnerable to outside attacks. But where do they start? With footprinting and reconnaissance—the process of gathering information about computers and the people to which they belong. In this course, Lisa Bock introduces the concepts, tools, and techniques behind footprinting: finding related websites, determining OS and location information, identifying users through social media and financial services, tracking email, and more. Footprinting relies on tools as simple as a web search and dumpster diving, and as complex as DNS interrogation and traceroute analysis. Lisa shows how to put these nefarious sounding tools to work for good, and mitigate any risks an organization has to these types of attacks.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Experienced author with a demonstrated history of working in the e-learning industry. She is a security ambassador with a broad range of IT skills and knowledge, including networking, CyberOps, Wireshark, biometrics, Ethical Hacking and the IoT. Lisa is an author for LinkedIn Learning, Packt Publishing and CompTIA and is an award-winning speaker who has presented at several national conferences. She holds a MS in computer information systems/information assurance from UMGC. Lisa was an associate professor in the IT department at Pennsylvania College of Technology (Williamsport, PA) from 2003 until her retirement in 2020. She is involved with various volunteer activities, and she and her husband Mike enjoy bike riding, watching movies, and traveling.
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 34
    • duration 1:55:11
    • English subtitles has
    • Release Date 2023/12/23

    Courses related to Ethical Hacking

    Courses related to Cyber Security

    Courses related to Cyber Security Awareness