Conducting Passive Reconnaissance for COMPTIA PenTest+

Conducting Passive Reconnaissance for COMPTIA PenTest+
English | Size: 742.89 MB
Category: Cloud-Comp | E-learning | HACKING | Linux | Networking | Security | Storage | Wireless


Conducting Passive Reconnaissance for CompTIA PenTest+
by Dale Meredith
Reconnaissance is the process of discovering information about the target before you engage. Passive Reconnaissance is doing this in a matter that leaves no trace, which helps to keep your identity under the hacker hoodie you’re wearing.
[Read more…]

PLURALSIGHT Conducting Passive Reconnaissance for CompTIA PenTest+

PLURALSIGHT CONDUCTING PASSIVE RECONNAISSANCE FOR COMPTIA PENTEST PLUS
English | Size: 753.27 MB
Category: Tutorial


Attackers spend 70-80 percent of their time gathering information about their target. Doing so answers tons of questions that save them time while becoming active. It only makes sense that you as a security professional do the same. In this course, Conducting Passive Reconnaissance for CompTIA PenTest+, you will learn about effective untraceable information gathering, referred to as reconnaissance. First, you will see what information can be discovered about your target using public and open source information. Next, you will discover what WHOIS, nslookup, and even Google can expose about your target. Finally, you will explore some applications that are designed to help automate this phase of reconnaissance. When you’re finished with this course, you will have the skills and knowledge of passive reconnaissance needed to conduct a penetration test. [Read more…]

INE | Ethical Hacking: Module 2 :: Footprinting and Reconnaissance | Josue Vargas

INE | Ethical Hacking: Module 2 :: Footprinting and Reconnaissance | Josue Vargas
English | Size: 588.47 MB
Category: Tutorial

Course Description
In this course you will become aware of the investigative tasks that a hacker needs to perform to accurately profile his targets and the different tools and public information sources which can provide valuable information (many times, information that should have never been made public). [Read more…]

Pluralsight – Performing and Analyzing Network Reconnaissance

Pluralsight – Performing and Analyzing Network Reconnaissance
English | Size: 1.10 GB
Category: Tutorial

Seeing what is currently being exposed about your networks and company resources is vital. This course will provide a fundamental understanding of both reconnaissance and scanning and how it can affect your security posture.
You’ve been tasked as an "Incident Handler" and you are wondering where you start. Attackers typically start with doing a little "reconnaissance" of their target, so it only makes sense that you start there as well. In this course, Performing and Analyzing Network Reconnaissance, you will learn how to think like an attacker in order to stay a step ahead of one. First, you will learn about the two different steps of reconnaissance and scanning. Next, you will learn what to look for, how it’s done, and what you can do to protect your infrastructures.
[Read more…]

LinuxCBT – Reconnaissance Edition

LinuxCBT - Reconnaissance Edition

Title: LinuxCBT – Reconnaissance Edition
Video Format: MP4
File Size: 0.99 GB
More info
[Read more…]

LinuxCBT – Reconnaissance and Network Mapping

LinuxCBT - Reconnaissance and Network Mapping

Title: LinuxCBT – Reconnaissance and Network Mapping
Video Format: MP4
File Size: 0.99 GB
More info
[Read more…]