Ethical Hacking: Footprinting and Reconnaissance [Updated]

Ethical Hacking: Footprinting and Reconnaissance [Updated]

MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1.5 Hours | 220 MB

Genre: eLearning | Language: English
If you watched our Introduction to Ethical Hacking course, you know the basics of ethical hacking. Ethical hackers use their knowledge for good: to test if an organization's network is vulnerable to outside attacks. But where do they start? With footprinting (aka reconnaissance), the process of gathering information about computers and the people to which they belong. In this course, Lisa Bock introduces the concepts, tools, and techniques behind footprinting: finding related websites, determining OS and location information, identifying users through social media and financial services, tracking email, and more. Footprinting relies on tools as simple as a web search and dumpster diving, and as complex as DNS interrogation and traceroute analysis. Lisa shows how to put these nefarious sounding tools to work for good, and mitigate any risks an organization has to these types of attacks.


[Fast Download] Ethical Hacking: Footprinting and Reconnaissance [Updated]

Related eBooks:
Terrorism and Insurgency in Asia : A Contemporary Examination of Terrorist and Separatist Movements
Practical Security Properties on Commodity Computing Platforms: The uber eXtensible Micro-Hypervisor
Shoot to Win: Training for the New Pistol, Rifle, and Shotgun Shooter
The Hurricane Preparedness Handbook
Certified Security Awareness Part 1
Mitigating Security Vulnerabilities on Google Cloud Platform
Comparative Histories of Crime by Martin Wiener
CISSP All-in-One Exam Guide
Airport Passenger Screening Using Millimeter Wave Machines : Compliance with Guidelines
Solving Cyber Risk: Protecting Your Company and Society
The Fugitive Game: Online With Kevin Mitnick
Guide to Computer Network Security, 4th edition
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.