CEH v11: Footprinting and Social Engineering Recon & Countermeasures

Ethical Hacker v11    |    Intermediate
  • 4 videos | 51m 24s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 28 users Rating 4.5 of 28 users (28)
If you're engaged in a security assessment, mapping your target's public network presence is a critical step in that process. In this course, you'll learn how to discover the public network info associated with your target. Next, you'll explore a few commonly used footprinting tools that will help you with not only the exam, but that can be used in real life as well. You'll move on to examine how you can use social engineering techniques like shoulder surfing and dumpster diving to obtain useful or sensitive information about your target's organization. Finally, you'll learn about some security controls that could be recommended to a client to help them better protect against an attacker's footprinting and recon efforts. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.

WHAT YOU WILL LEARN

  • Discover public network info associated with a target
    recognize the hosts and systems between you and a target over the public network
    Identify some commonly used footprinting tools
    recognize footprinting tools that will help you with the exam
  • Identifying social engineering and how it can be used to target an organization
    recognize the different types of social engineering techniques used to obtain sensitive information
    Identify security controls and how they should be implemented to better protect against an attackers footprinting and recon efforts
    describe security controls that can help a client better protect themselves

IN THIS COURSE

  • Locked
    1.  Public Network Footprinting
    10m 48s
    After completing this video, you will be able to discover public network information associated with a target. FREE ACCESS
  • Locked
    2.  Other Footprinting Tools
    13m 6s
    During this video, you will learn how to identify some tools that are commonly used for footprinting. FREE ACCESS
  • Locked
    3.  Social Engineering Recon
    14m 34s
    In this video, you will learn how to identify social engineering and how it can be used to target an organization. FREE ACCESS
  • Locked
    4.  Footprinting and Recon Countermeasures
    12m 56s
    In this video, you will identify security controls and how they should be implemented to better protect against an attacker's footprinting and recon efforts. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.8 of 20 users Rating 4.8 of 20 users (20)
Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.7 of 24 users Rating 4.7 of 24 users (24)
Rating 4.4 of 22 users Rating 4.4 of 22 users (22)
Rating 4.6 of 78 users Rating 4.6 of 78 users (78)