Visit LEDU token page

How to do Footprinting & Reconnaissance as a CEH

How to do Footprinting & Reconnaissance as a CEH

  • English
  • Cybersecurity
  • Ethical HackingEthical Hacking
  • (862)
  • Project length: 1h 30m

Computer and network security is a complex subject and an ever-moving target. we must stay aware and on top of it so that our information is protected from various attacks. At this point CEH comes into play, we will understand the concepts but we will dig deeper into Practical Approach. Benefit of this course? 1) Increased demand of cyber specialist in IT field as everything is vulnerable in today's era. 2) Protecting yourself from various attacks.

Overview

Footprinting & Reconnaissance In this module we will understand how hackers perform footprinting and reconnaissance for gathering information about people, website, network using various tools and techniques.

Project Outline

In this module we will cover the following topics :

  • Understanding concepts behind information gathering
  • Gathering information using Command prompt utilities
  • Gathering information about people
  • Gathering information about websites using various techniques
  • Extracting information using Google Hacking
  • Catching fake emails and tracing back the IP address
  • Using Recon-ng tool in Kali for information gathering
  • Extracting cookie from a browser

Reviews

Average rating

4(862 Reviews)