CEH v12: Recon Tools and Tactics
CEH v12
| Intermediate
- 4 videos | 1h 6m 42s
- Includes Assessment
- Earns a Badge
Having knowledge of a target's physical location can be useful for social engineering and physical security assessments. In this course, you'll explore tools and tactics used to learn a target's geographical location. Next, you'll examine how conducting Open Source Intelligence on social media sites can yield sensitive information through direct investigation or social engineering. You'll move on to learn how to utilize job posts and job boards to search out useful target info like what technologies are being used, names of legitimate users, and areas that may be weak due to lack of staffing. Finally, you'll explore the large portion of the Internet that consists of the dark and deep webs and how these mostly unseen resources can be used to discover potentially sensitive info about a target. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.
WHAT YOU WILL LEARN
-
Conducting open source intelligence (osint) searches on social media sitesusing tools to do open source intelligence (osint) searches on social media sitesrecognizing how social media sites can yield sensitive information through investigation or through social engineeringUtilize job posts and job boards to search out useful target info like what technologies are being used
-
Describe the large portion of the internet and how to use those mostly unseen resourcesrecognize the different portions of the internetdescribe how to use the mostly unseen resources on the internet to discover potentially sensitive information about a targetRecognize tools used for email tracking
IN THIS COURSE
-
17m 58sAfter completing this video, you will be able to recognize how conducting Open Source Intelligence (OSINT) on social media sites can yield sensitive information through direct investigation or social engineering. FREE ACCESS
-
15mIn this video, you will learn how to utilize job posts and job boards to fine useful target information such as what technologies are being used, names of legitimate users, and areas that may be weak due to lack of staffing. FREE ACCESS
-
22m 29sUpon completion of this video, you will be able to outline the portion of the Internet that consists of the dark and deep webs and how to use these resources to discover potentially sensitive information about a target. FREE ACCESS
-
11m 15sIn this video, find out how to use email tracking systems to glean information such as IP addresses, geolocation, and host operating systems. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.