وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Ethical Hacking: Reconnaissance/Footprinting

سرفصل های دوره

Reconnaissance/Footprinting is the first phase attackers perform. This course will teach you the skills attackers use, which is needed for the CEH Exam.


1. Course Overview
  • 1. Course Overview

  • 2. Describing ReconnaissanceFootprinting
  • 1. Course Introduction
  • 2. CEH Exam Study Tips
  • 3. Overview of Reconnaissance
  • 4. Types of Reconnaissance
  • 5. Goals of Reconnaissance
  • 6. Footprinting
  • 7. Learning Check

  • 03. Using Search Engines against a Target
  • 01. The 4 Categories
  • 02. Demo - Looking at Google Differently
  • 03. Demo - Google Advanced Search
  • 04. Demo - Using the Basic Operators
  • 05. Advanced Google Operators
  • 06. Demo - Advanced Google Hacking
  • 07. What Can You Find with Google Hacking
  • 08. Demo - More Google Hacking
  • 09. Demo - Using the Google Hacking Database (GHDB)
  • 10. Demo - Other Search Engines Resources
  • 11. Demo - Discovering IoT Devices on Shodan
  • 12. Learning Check

  • 04. Capturing Intel through Web Services
  • 01. What Intel Can You Capture
  • 02. Demo - Netcraft
  • 03. Demo - Sublist3r
  • 04. Demo - Getting Geo-location Intel
  • 05. Demo - People Search with Peekyou
  • 06. Demo - theHavester
  • 07. Demo - Hunter
  • 08. Gaining the Upper Hand with Competitive Intelligence
  • 09. What Can You Find on Job Sites
  • 10. Demo - Job Sites and Hiring Pages
  • 11. Learning Check

  • 5. Exploiting Social Media
  • 1. You Share Too Much!
  • 2. What Can You Learn
  • 3. Six Things You Should Know About Facebook
  • 4. Demo - Looking at Facebook
  • 5. Demo - Company Social Media Exposure
  • 6. Demo - Followerwonk and Sherlock
  • 7. Learning Check

  • 6. Acquiring Intel From Websites
  • 1. Your Own Site Can Give You Away!
  • 2. Demo - A Close Look at the Targets Webpage
  • 3. Demo - Using the WayBackMachine
  • 4. Demo - Spider a Website with WinTTrack
  • 5. Demo - Creating Wordlists via CeWL
  • 6. Demo - Gathering Online Files with Metagoofil
  • 7. What Press Releases and News Can Tell You
  • 8. Demo - Monitoring Changes in Webpages
  • 9. Learning Check

  • 7. Derive Intel from Email
  • 1. Youve Got Mail = Ive Got You!
  • 2. Demo - Tracking Emails with eMailTrackerPro
  • 3. Learning Check

  • 8. Examining Whois and DNS for Intel
  • 1. WHOIS on First
  • 2. Demo - Using WHOIS
  • 3. DNS Footprinting
  • 4. Demo - Using NSLookup for DNS Footprinting
  • 5. Demo - Advanced DNS Reconnaissance
  • 6. Demo - Using DNSRecon to Pull Intel
  • 7. Learning Check

  • 9. Discovering Intel from Network ReconnaissanceFootprinting
  • 1. Who Is Arin
  • 2. Using Traceroute
  • 3. Demo - Using Keycdn and GeoTraceroute
  • 4. Learning Check

  • 10. Employing Social Engineering Tactics
  • 1. Employing Social Engineering Tactics
  • 2. Learning Check

  • 11. Examining the Tools of Attackers and the Countermeasures
  • 1. Demo - Using Maltego
  • 2. Demo - Recon-ng
  • 3. Demo - FOCA
  • 4. Demo - OSRFramework
  • 5. Demo - OSINT Framework
  • 6. The Countermeasures
  • 7. Learning Check

  • 12. Domain Summary
  • 1. Domain Summary
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 3996
    حجم: 669 مگابایت
    مدت زمان: 258 دقیقه
    تاریخ انتشار: 29 دی 1401
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید