وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
1

Ethical Hacking: Reconnaissance/Footprinting

سرفصل های دوره

Reconnaissance/Footprinting is the first phase attackers perform. This course will teach you the skills attackers use, which is needed for the CEH Exam.


1. Course Overview
  • 1. Course Overview

  • 2. Describing ReconnaissanceFootprinting
  • 1. Course Introduction
  • 2. CEH Exam Study Tips
  • 3. Overview of Reconnaissance
  • 4. Types of Reconnaissance
  • 5. Goals of Reconnaissance
  • 6. Footprinting
  • 7. Learning Check

  • 03. Using Search Engines against a Target
  • 01. The 4 Categories
  • 02. Demo - Looking at Google Differently
  • 03. Demo - Google Advanced Search
  • 04. Demo - Using the Basic Operators
  • 05. Advanced Google Operators
  • 06. Demo - Advanced Google Hacking
  • 07. What Can You Find with Google Hacking
  • 08. Demo - More Google Hacking
  • 09. Demo - Using the Google Hacking Database (GHDB)
  • 10. Demo - Other Search Engines Resources
  • 11. Demo - Discovering IoT Devices on Shodan
  • 12. Learning Check

  • 04. Capturing Intel through Web Services
  • 01. What Intel Can You Capture
  • 02. Demo - Netcraft
  • 03. Demo - Sublist3r
  • 04. Demo - Getting Geo-location Intel
  • 05. Demo - People Search with Peekyou
  • 06. Demo - theHavester
  • 07. Demo - Hunter
  • 08. Gaining the Upper Hand with Competitive Intelligence
  • 09. What Can You Find on Job Sites
  • 10. Demo - Job Sites and Hiring Pages
  • 11. Learning Check

  • 5. Exploiting Social Media
  • 1. You Share Too Much!
  • 2. What Can You Learn
  • 3. Six Things You Should Know About Facebook
  • 4. Demo - Looking at Facebook
  • 5. Demo - Company Social Media Exposure
  • 6. Demo - Followerwonk and Sherlock
  • 7. Learning Check

  • 6. Acquiring Intel From Websites
  • 1. Your Own Site Can Give You Away!
  • 2. Demo - A Close Look at the Targets Webpage
  • 3. Demo - Using the WayBackMachine
  • 4. Demo - Spider a Website with WinTTrack
  • 5. Demo - Creating Wordlists via CeWL
  • 6. Demo - Gathering Online Files with Metagoofil
  • 7. What Press Releases and News Can Tell You
  • 8. Demo - Monitoring Changes in Webpages
  • 9. Learning Check

  • 7. Derive Intel from Email
  • 1. Youve Got Mail = Ive Got You!
  • 2. Demo - Tracking Emails with eMailTrackerPro
  • 3. Learning Check

  • 8. Examining Whois and DNS for Intel
  • 1. WHOIS on First
  • 2. Demo - Using WHOIS
  • 3. DNS Footprinting
  • 4. Demo - Using NSLookup for DNS Footprinting
  • 5. Demo - Advanced DNS Reconnaissance
  • 6. Demo - Using DNSRecon to Pull Intel
  • 7. Learning Check

  • 9. Discovering Intel from Network ReconnaissanceFootprinting
  • 1. Who Is Arin
  • 2. Using Traceroute
  • 3. Demo - Using Keycdn and GeoTraceroute
  • 4. Learning Check

  • 10. Employing Social Engineering Tactics
  • 1. Employing Social Engineering Tactics
  • 2. Learning Check

  • 11. Examining the Tools of Attackers and the Countermeasures
  • 1. Demo - Using Maltego
  • 2. Demo - Recon-ng
  • 3. Demo - FOCA
  • 4. Demo - OSRFramework
  • 5. Demo - OSINT Framework
  • 6. The Countermeasures
  • 7. Learning Check

  • 12. Domain Summary
  • 1. Domain Summary
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 3996
    حجم: 669 مگابایت
    مدت زمان: 258 دقیقه
    تاریخ انتشار: ۲۹ دی ۱۴۰۱
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید