CEH v12: Footprinting, Google Dorks, Search Engines, and Subdomains
CEH v12
| Intermediate
- 4 videos | 1h 22m 17s
- Includes Assessment
- Earns a Badge
Knowledge is power and in the ethical hacking game, the more you know about your target, the more likely you are to find a weakness in their security. In this course, you'll explore the practice of footprinting and the different types of information you can gather in this initial stage of attack. Next, you'll examine Google Dorks and some of the useful advanced search features of the Google search engine. You'll learn how to use the Shodan, Censys, and Thingful search engines to find IoT and other Internet-connected hosts and services in order to see the larger attack surface of a target. Finally, you'll explore subdomains and how they can lead to compromise if not properly managed, as well as some tools that can help you enumerate a target's subdomains. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.
WHAT YOU WILL LEARN
-
Recognize the different types of footprintingrecognize the purpose of passive footprintingidentify the goal of active footprintingIdentify the term used for google keywords to locate sensitive information on the internetrecognize how to locate a specific document on the internetidentify tools used to help with google dork searches
-
Recognize tools used to locate iot devices on the internetrecognize how to use shodanidentify a tool used to locate devices connected to the internetIdentify a website that can be used to search for subdomainsrecognize a tool in kali linux that can be used to search for subdomainsidentify the google dork used to manually locate subdomains
IN THIS COURSE
-
20m 25sAfter completing this video, you will be able to provide an overview of footprinting and recognize the different types of information you can gather in this initial stage of attack. FREE ACCESS
-
19m 49sUpon completion of this video, you will be able to outline the use of Google Dorks, identify some of the advanced search features of the Google search engine, and recognize how these features may be used to discover vulnerabilities and sensitive information with our targets. FREE ACCESS
-
24m 25sAfter completing this video, you will be able to recognize how the Shodan, Censys, and Thingful search engines can be used to find Internet of Things (IoT) and other Internet-connected hosts and services, in order to see the larger attack surface of a target. FREE ACCESS
-
17m 39sUpon completion of this video, you will be able to outline subdomains, analyze how they can lead to compromise if not properly managed, and recognize tools that can help enumerate a target's subdomains. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.