Learn about Footprinting, the first stage of the Hacker activity, and get ready for cybersecurity exams

What you will learn

Footprinting Methodology

Footprinting through Search Engines

Google Hacking

Objectives of Footprinting

Footprinting Fundamentals

Footprinting importance to Ethical Hacking

Information Gathering

Passive information gathering

Active information gathering

Footprinting Lab Demonstration

Description

Learn the concepts, tools, and techniques behind footprinting: ethical hacking techniques for finding information about computers and the people they belong to.

Ethical hackers use their knowledge for good: to test if an organization’s network is vulnerable to outside attacks. But where do they start? With footprinting (aka reconnaissance), the process of gathering information about computers and the people to which they belong. In this course, you are introduced to the concepts, tools, and techniques behind footprinting: finding related websites, determining OS and location information, identifying users through social media and financial services, tracking email, and more. Footprinting relies on tools as simple as a web search and dumpster diving, and as complex as DNS interrogation and traceroute analysis. Lisa shows how to put these nefarious sounding tools to work for good, and mitigate any risks an organization has to these types of attacks.

Who This Course Is For:

  • Cybersecurity Analysts
  • Cloud Engineers
  • Network Security Engineers
  • Solution Architects
  • DevOps Engineers
  • System Administrators
  • Auditors
  • Penetration Testers
  • Ethical Hackers
  • Offensive Security Engineers

Introduction

  • Scouting the target
  • What you should know
  • Disclaimer

1. Footprinting Overview


Get Instant Notification of New Courses on our Telegram channel.


  • Footprinting and reconnaissance
  • Using competitive intelligence
  • Search engines and Google hacking
  • Getting social
  • Using AnyWho, Spokeo, and Yansi
  • Tracking online reputation

2. Email and Websites

  • Website and email footprinting
  • Mirroring websites
  • Monitoring websites
  • Investigating email
  • OSINT tools

3. Footprinting Tools

  • Footprinting network and DNS
  • Domain name generators
  • Understanding ICMP
  • Using Ping and Tracert
  • Analyzing the path
  • nslookup and dig

Conclusion

  • Footprinting countermeasures
  • Footprinting pen testing and reports
  • Next steps

English

Language

Content

What is Footprinting?

What is Footprinting?

What Types of Information to Look For

What Types of Information to Look For

Footprinting Helps To?

Footprinting Helps To?

Footprinting Methodology

Footprinting Methodology

Footprinting Lab Demonstration

Footprinting Lab Demonstration