CompTIA PenTest+: Enumeration & Reconnaissance Tools

CompTIA PenTest+    |    Intermediate
  • 20 videos | 2h 9m 28s
  • Includes Assessment
  • Earns a Badge
For reconnaissance and enumeration during a pen test, you'll want to have a tool kit so you can gather information about the target network or system without raising suspicion. In this course, explore a multitude of tools used to collect, monitor, and analyze target systems, including Nmap, a powerful network scanner that can discover computer network hosts and services. Next, discover open-source tools such as the Wayback Machine, the Shodan search engine, and SpiderFoot, as well as common networking commands such as WHOIS, dig, and nslookup. Finally, learn how to find free resources online using OSINTframework.com and how to use Wireshark and Aircrack-ng when performing network reconnaissance. This course is one of a collection that helps prepare learners for the CompTIA PenTest+ (PT0-003) certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Use the wayback machine to review internet archives
    Perform link analysis using the maltego tool
    Perform passive reconnaissance using the recon-ng tool
    Perform crawling, ip lookups, searching, and data streaming using the shodan platform
    Use the spiderfoot intelligence automation tool for open-source reconnaissance
    Look up an ip address and domain information using whois
    Query dns information using the dig and nslookup commands
    Perform open-source intelligence using censys
    Use the hunter email outreach platform for enumeration
  • Use the dnsdumpster tool to perform security assessments
    Perform open-source reconnaissance using amass
    Write scripts using the nmap scripting engine (nse)
    Use the theharvester tool to gather information, including emails, hosts, ports, and banners
    Use wigle to collect information about wireless hotspots around the world
    Scan applications using the inssider tool 
    Identify free resources using the osintframework.com website
    Use wireshark to perform reconnaissance
    Outline how to use aircrack-ng to monitor and analyze wi-fi networks
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 16s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 7m 46s
    In this video, you will learn how to use the Wayback Machine to review Internet archives. FREE ACCESS
  • Locked
    3.  Performing Link Analysis Using Maltego
    8m 14s
    Discover how to perform link analysis using the Maltego tool. FREE ACCESS
  • Locked
    4.  Using Recon-ng for Reconnaissance
    9m 2s
    In this video, find out how to perform passive reconnaissance using the Recon-ng tool. FREE ACCESS
  • Locked
    5.  Utilizing the Shodan Search Engine
    7m 25s
    Learn how to perform crawling, IP lookups, searching, and data streaming using the Shodan platform. FREE ACCESS
  • Locked
    6.  Performing Open-source Reconnaissance Using SpiderFoot
    5m 51s
    During this video, discover how to use the SpiderFoot intelligence automation tool for open-source reconnaissance. FREE ACCESS
  • Locked
    7.  Implementing Queries Using WHOIS
    6m 8s
    In this video, you will learn how to look up an IP address and domain information using WHOIS. FREE ACCESS
  • Locked
    8.  Using the nslookup and dig Commands for Queries
    7m 7s
    Find out how to query DNS information using the dig and nslookup commands. FREE ACCESS
  • Locked
    9.  Utilizing Censys for Open-source Intelligence
    7m 33s
    During this video, you will learn how to perform open-source intelligence using Censys. FREE ACCESS
  • Locked
    10.  Using the Hunter Email Outreach Platform for Enumeration
    8m 36s
    In this video, learn how to use the Hunter email outreach platform for enumeration. FREE ACCESS
  • Locked
    11.  Performing Security Assessments Using DNSDumpster
    5m 54s
    Discover how to use the DNSDumpster tool to perform security assessments. FREE ACCESS
  • Locked
    12.  Executing Open-source Reconnaissance Using Amass
    6m 17s
    In this video, we will perform open-source reconnaissance using Amass. FREE ACCESS
  • Locked
    13.  Writing Scripts with the Nmap Scripting Engine (NSE)
    7m 44s
    Learn how to write scripts using the Nmap Scripting Engine (NSE). FREE ACCESS
  • Locked
    14.  Gathering Information Using theHarvester
    7m 8s
    During this video, discover how to use the theHarvester tool to gather information, including emails, hosts, ports, and banners. FREE ACCESS
  • Locked
    15.  Identifying Wireless Hotspots Using WiGLE
    6m 24s
    In this video, find out how to use WiGLE to collect information about wireless hotspots around the world. FREE ACCESS
  • Locked
    16.  Using the inSSIDer Network Scanner Application
    5m 43s
    In this video, learn how to scan applications using the inSSIDer tool . FREE ACCESS
  • Locked
    17.  The OSINTframework.com Website
    5m 37s
    After completing this video, you will be able to identify free resources using the OSINTframework.com website. FREE ACCESS
  • Locked
    18.  Using Wireshark to Perform Reconnaissance
    7m 16s
    During this video, you will learn how to use Wireshark to perform reconnaissance. FREE ACCESS
  • Locked
    19.  Analyze Wi-Fi Networks Using Aircrack-ng
    7m 9s
    Upon completion of this video, you will be able to outline how to use Aircrack-ng to monitor and analyze Wi-Fi networks. FREE ACCESS
  • Locked
    20.  Course Summary
    1m 17s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 44 users Rating 4.6 of 44 users (44)
Rating 4.6 of 65 users Rating 4.6 of 65 users (65)
Rating 4.6 of 38 users Rating 4.6 of 38 users (38)