Certified Ethical Hacker (CEH) v8: Footprinting and Reconnaissance

This course is included in the Everything IT Self-Paced training package.


Footprinting is a set of intelligence gathering techniques whereby an attacker attempts to gain information about a target network and computer devices. In this course, we discuss footprinting and reconnaissance, and the tools and techniques used. An ethical hacker is a person who attacks an organization’s security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. This course is the second in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.

Target Audience

Network and information security professionals





Expected Duraction

90 mins.

Course Objectives

What is Footprinting?

  • recognize the purpose of footprinting
  • Footprinting through Search Engines and Web Sites

  • identify methods used to mirror a web site
  • Footprinting through E-mail, Google, and WHOIS

  • match the competitive intelligence information you can obtain with the web site you use to obtain it
  • Footprinting through Networking and Social Networking

  • identify social engineering techniques
  • Footprinting Tools and Countermeasures

  • differentiate between footprinting tools
  • Footprinting

    This Course is included in our Everything IT Self-Paced Training Package.

      Learn More