Certified Ethical Hacker (CEH) v8: Footprinting and Reconnaissance
This course is included in the Everything IT Self-Paced training package.
Footprinting is a set of intelligence gathering techniques whereby an attacker attempts to gain information about a target network and computer devices. In this course, we discuss footprinting and reconnaissance, and the tools and techniques used. An ethical hacker is a person who attacks an organizations security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. This course is the second in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
Network and information security professionals
What is Footprinting?
Footprinting through Search Engines and Web Sites
Footprinting through E-mail, Google, and WHOIS
Footprinting through Networking and Social Networking
Footprinting Tools and Countermeasures
This Course is included in our Everything IT Self-Paced Training Package.Learn More