CEH v11: Footprinting, Google Dorks, Search Engines & Sub-domains

Ethical Hacker v11    |    Intermediate
  • 4 videos | 1h 5m 4s
  • Includes Assessment
  • Earns a Badge
Rating 4.8 of 41 users Rating 4.8 of 41 users (41)
Knowledge is power and in the ethical hacking game, the more you know about your target, the more likely you are to find a weakness in their security. In this course, you'll explore the practice of footprinting and the different types of information you can gather in this initial stage of attack. Next, you'll examine Google Dorks and some of the useful advanced search features of the Google search engine. You'll learn how to use the Shodan, Censys, and Thingful search engines to find IoT and other Internet-connected hosts and services in order to see the larger attack surface of a target. Finally, you'll explore sub-domains and how they can lead to compromise if not properly managed, as well as some tools that can help you enumerate a target's sub-domains. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.

WHAT YOU WILL LEARN

  • Recognize the purpose of passive footprinting
    recognize the different types of footprinting
    identify the goal of active footprinting
    Identify the term used for google keywords to locate sensitive information on the internet
    identify tools used to help with google dork searches
    recognize how to locate a specific document on the internet
  • Identify a tool used to locate devices connected to the internet
    recognize tools used to locate iot devices on the internet
    recognize how to use shodan
    Identify the google dork used to manually locate subdomains
    recognize a tool in kali linux that can be used to search for subdomains
    identify a website that can be used to search for subdomains

IN THIS COURSE

  • Locked
    1.  Footprinting Concepts
    15m 10s
    Upon completion of this video, you will be able to recognize the different types of footprints. FREE ACCESS
  • Locked
    2.  Google Dorks
    16m 10s
    In this video, find out how to identify tools that can help with Google Dork searches. FREE ACCESS
  • Locked
    3.  Shodan Censys and Thingful
    17m 56s
    After completing this video, you will be able to recognize tools used to locate IoT devices on the Internet. FREE ACCESS
  • Locked
    4.  Sub-domain Enumeration
    15m 48s
    After completing this video, you will be able to recognize a tool in Kali Linux that can be used to search for subdomains. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.8 of 30 users Rating 4.8 of 30 users (30)
Rating 4.6 of 63 users Rating 4.6 of 63 users (63)
Rating 4.6 of 242 users Rating 4.6 of 242 users (242)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 25 users Rating 4.6 of 25 users (25)
Rating 4.8 of 30 users Rating 4.8 of 30 users (30)
Rating 4.7 of 20 users Rating 4.7 of 20 users (20)