Ethical Hacking: Recon and Footprinting

$49.99 $29.00

Dive into the field of Cyber Security with this Ethical Hacking: Recon and Footprinting training course. Start by learning about website and e-mail footprinting, and then move on to topics such as port inspection with Netstat, Nmap and Metasploit, and Maltego. By the time you've completed this course, you will know how to perform a SNMP probe and SMTP inspection, and so much more!

Length: 1 hrs

This title is available in the
Total Training All-Access library.

Subscribe Now

Description

With this Ethical Hacking: Recon and Footprinting training course, you will learn all about web site analysis performance and attack methods.

This course is for both beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! There are currently over a million Cyber Security job openings globally, and demand is greatly outpacing supply – which means more opportunity, job security, and higher pay for you!

What is Recon and Footprinting?

Footprinting and Recon (Reconnaissance) go hand-in-hand in terms of cyber security. The attack surface of a system, network, or organization is referred to as the footprint. Determining that footprint and covertly collecting information on the target is referred to as recon. The process of footprinting and recon is often used early in an attack by penetration testers.

 

Sample clip

 

1. Recon and Footprinting
 Website and E-Mail Footprinting (4:11)
 Port Inspection with Netstat (3:03)
 Nmap and Metasploit (2:32)
 Maltego (5:24)
 Who is and Nslookup (3:06)
 Shodan and IoT Enumeration (3:22)
 NTP Enumeration (1:16)
 Probing SNMP (2:25)
 Inspecting SMTP (0:35)
 SMB Discovery (2:04)
 Commonly used network ports and protocols (14:06)

Chad Russell has been in the CyberSecurity industry for over 15 years. He has taught Microsoft Engineering courses as a Certified trainer, managed teams of security engineers and analysts for an internet banking provider, and has been an information security consultant working for companies including SAP, Microsoft and Oracle.

He leads and conducts ‘Security Risk Assessments’ for customers throughout North America with an emphasis on cloud security, identity governance, network security, social engineering, mobile security, breach assessments, database security, and access management.

Over the past 15 years he has held numerous certifications including CISSP, CCNP, MCSE and MCDBA certifications, and has a B.S. in Computer Science from Excelsior College.

You may also like…