CEH v12: Recon Tools and Tactics

CEH v12    |    Intermediate
  • 4 videos | 1h 6m 42s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Having knowledge of a target's physical location can be useful for social engineering and physical security assessments. In this course, you'll explore tools and tactics used to learn a target's geographical location. Next, you'll examine how conducting Open Source Intelligence on social media sites can yield sensitive information through direct investigation or social engineering. You'll move on to learn how to utilize job posts and job boards to search out useful target info like what technologies are being used, names of legitimate users, and areas that may be weak due to lack of staffing. Finally, you'll explore the large portion of the Internet that consists of the dark and deep webs and how these mostly unseen resources can be used to discover potentially sensitive info about a target. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.

WHAT YOU WILL LEARN

  • Conducting open source intelligence (osint) searches on social media sites
    using tools to do open source intelligence (osint) searches on social media sites
    recognizing how social media sites can yield sensitive information through investigation or through social engineering
    Utilize job posts and job boards to search out useful target info like what technologies are being used
  • Describe the large portion of the internet and how to use those mostly unseen resources
    recognize the different portions of the internet
    describe how to use the mostly unseen resources on the internet to discover potentially sensitive information about a target
    Recognize tools used for email tracking

IN THIS COURSE

  • Locked
    1.  Social Networking Recon
    17m 58s
    After completing this video, you will be able to recognize how conducting Open Source Intelligence (OSINT) on social media sites can yield sensitive information through direct investigation or social engineering. FREE ACCESS
  • Locked
    2.  Job Board Recon
    15m
    In this video, you will learn how to utilize job posts and job boards to fine useful target information such as what technologies are being used, names of legitimate users, and areas that may be weak due to lack of staffing. FREE ACCESS
  • Locked
    3.  Deep and Dark Web Recon
    22m 29s
    Upon completion of this video, you will be able to outline the portion of the Internet that consists of the dark and deep webs and how to use these resources to discover potentially sensitive information about a target. FREE ACCESS
  • Locked
    4.  Email Tracking
    11m 15s
    In this video, find out how to use email tracking systems to glean information such as IP addresses, geolocation, and host operating systems. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)