CEH v11: Metadata, Wordlists, Email, WHOIS & DNS Recon

Ethical Hacker v11    |    Intermediate
  • 4 videos | 54m 26s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 23 users Rating 4.7 of 23 users (23)
When you're looking for useful target information, you want to pull from every available source. In this course, you'll investigate how to gather and inspect metadata for possible sensitive info about a target. You'll learn how to use wordlists for fuzzing and password attacks, about the usefulness of custom wordlists, and how to generate a wordlist based off the target's web presence. Next, you'll examine how e-mail tracking systems can glean info like IP addresses, geolocation, and host operating systems. Finally, you'll learn about useful information that can be found using WHOIS and DNS service. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.

WHAT YOU WILL LEARN

  • Recognize tools used to extract metadata
    recognize tools used to locate files on a website
    Identify the location of sample word list files in kali linux
    recognize tools that can be used to create custom word list files
    identify the term used for files that contain common words and passwords
  • Recognize tools used for email tracking
    Recognize commands used to enumerate dns
    identify the different types of whois models
    identify tools used to perform whois searches

IN THIS COURSE

  • Locked
    1.  Metadata Recon
    13m 56s
    Upon completion of this video, you will be able to recognize tools used to locate files on a website. FREE ACCESS
  • Locked
    2.  Custom Wordlists
    16m 24s
    Upon completion of this video, you will be able to recognize tools that can be used to create custom word lists. FREE ACCESS
  • Locked
    3.  E-mail Tracking Systems
    8m 33s
    Upon completion of this video, you will be able to recognize tools used for email tracking. FREE ACCESS
  • Locked
    4.  WHOIS and DNS Recon
    15m 35s
    During this video, you will learn how to identify the different types of whois records. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 23 users Rating 4.5 of 23 users (23)
Rating 4.8 of 41 users Rating 4.8 of 41 users (41)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 17 users Rating 4.6 of 17 users (17)
Rating 4.8 of 41 users Rating 4.8 of 41 users (41)
Rating 4.5 of 42 users Rating 4.5 of 42 users (42)