CEH v12: Footprinting and Social Engineering Recon and Countermeasures
CEH v12
| Intermediate
- 4 videos | 1h 14m
- Includes Assessment
- Earns a Badge
If you're engaged in a security assessment, mapping your target's public network presence is a critical step in that process. In this course, you'll learn how to discover the public network information associated with your target using WHOIS and DNS services. Next, you'll explore a few commonly used footprinting tools that will help you with not only the exam, but in real life as well. You'll move on to examine how you can use social engineering techniques like shoulder surfing and dumpster diving to obtain useful or sensitive information about your target's organization. Finally, you'll learn about some security controls that could be recommended to a client to help them better protect against an attacker's footprinting and recon efforts. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.
WHAT YOU WILL LEARN
-
Identify the different types of whois modelsidentify tools used to perform whois searchesrecognize commands used to enumerate dnsIdentifying social engineering and how it can be used to target an organizationrecognize the different types of social engineering techniques used to obtain sensitive information
-
Recognize footprinting tools that will help you with the examidentify some commonly used footprinting toolsDescribe security controls that can help a client better protect themselvesidentify security controls and how they should be implemented to better protect against an attackers footprinting and recon efforts
IN THIS COURSE
-
20m 7sIn this video, find out how to use WHOIS and DNS services to glean useful information about a target. FREE ACCESS
-
17m 10sLearn how to use social engineering techniques like shoulder surfing and dumpster diving to obtain useful or sensitive information about your target's organization. FREE ACCESS
-
18m 16sUpon completion of this video, you will be able to recognize commonly used footprinting tools that will help you with not only the exam, but that are employed in real-life as well. FREE ACCESS
-
18m 28sAfter completing this video, you will be able to recognize security controls that could be recommended to a client to help them better protect against an attacker's footprinting and recon efforts. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.