Ethical Hacking: Footprinting and Reconnaissance | Lynda


Ethical Hacking: Footprinting and Reconnaissance | Lynda
English | Size: 253.79 MB
Genre: eLearning

If you watched our Introduction to Ethical Hacking course, you know the basics of ethical hacking. Ethical hackers use their knowledge for good: to test if an organization’s network is vulnerable to outside attacks. But where do they start? With footprinting (aka reconnaissance), the process of gathering information about computers and the people to which they belong. In this course, Lisa Bock introduces the concepts, tools, and techniques behind footprinting: finding related websites, determining OS and location information, identifying users through social media and financial services, tracking email, and more. Footprinting relies on tools as simple as a web search and dumpster diving, and as complex as DNS interrogation and traceroute analysis. Lisa shows how to put these nefarious sounding tools to work for good, and mitigate any risks an organization has to these types of attacks.

Note: Our Ethical Hacking series maps to the EC-Council’s certification exam. This course maps to the 02 Footprinting and Reconnaissance domain.

nitroflare.com/view/4798104533E672C/LN.Ethical.Hacking.Footprinting.and.Reconnaissance.26.2.part1.rar
nitroflare.com/view/0DE79305CA49CE5/LN.Ethical.Hacking.Footprinting.and.Reconnaissance.26.2.part2.rar

rapidgator.net/file/ec19d6d8a4e38620179e04bbb6ba285e/LN.Ethical.Hacking.Footprinting.and.Reconnaissance.26.2.part1.rar.html
rapidgator.net/file/e4f398c7f46c40b4cfead20c7dc17935/LN.Ethical.Hacking.Footprinting.and.Reconnaissance.26.2.part2.rar.html

If any links die or problem unrar, send request to
forms.gle/e557HbjJ5vatekDV9

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.