Conducting Passive Reconnaissance for COMPTIA PenTest+

Conducting Passive Reconnaissance for COMPTIA PenTest+
English | Size: 742.89 MB
Category: Cloud-Comp | E-learning | HACKING | Linux | Networking | Security | Storage | Wireless


Conducting Passive Reconnaissance for CompTIA PenTest+
by Dale Meredith
Reconnaissance is the process of discovering information about the target before you engage. Passive Reconnaissance is doing this in a matter that leaves no trace, which helps to keep your identity under the hacker hoodie you’re wearing.
[Read more…]

PLURALSIGHT Conducting Passive Reconnaissance for CompTIA PenTest+

PLURALSIGHT CONDUCTING PASSIVE RECONNAISSANCE FOR COMPTIA PENTEST PLUS
English | Size: 753.27 MB
Category: Tutorial


Attackers spend 70-80 percent of their time gathering information about their target. Doing so answers tons of questions that save them time while becoming active. It only makes sense that you as a security professional do the same. In this course, Conducting Passive Reconnaissance for CompTIA PenTest+, you will learn about effective untraceable information gathering, referred to as reconnaissance. First, you will see what information can be discovered about your target using public and open source information. Next, you will discover what WHOIS, nslookup, and even Google can expose about your target. Finally, you will explore some applications that are designed to help automate this phase of reconnaissance. When you’re finished with this course, you will have the skills and knowledge of passive reconnaissance needed to conduct a penetration test. [Read more…]

Pluralsight – Conducting Network Vulnerability Analysis

Pluralsight – Conducting Network Vulnerability Analysis
English | Size: 405.68 MB
Category: CBTs

This course will teach you how to find vulnerabilities in systems and software by teaching the process that a hacker uses when they target an organization.
One of the critical things for anyone who wants to learn either how to defend or even attack a network, is the ability to find and analyze system or network vulnerabilities. In this course, Conducting Network Vulnerability Analysis, you will learn to how to follow a systematic process and use this to process and identify potential vulnerabilities. [Read more…]