Ethical Hacking: Recon and Footprinting

Ethical Hacking: Recon and Footprinting

Dive into the field of Cyber Security with this ’Ethical Hacking: Recon and Footprinting’ training course. Start by learning about website and e-mail footprinting, and then move on to topics such as port inspection with Netstat, Nmap and Metasploit, and Maltego. By the time you’ve completed this course, you will know how to perform a SNMP probe and SMTP inspection, and so much more! Length: 1 hrs



Why Choose Us?


With this Ethical Hacking: Recon and Footprinting training course, you will learn all about web site analysis performance and attack methods.

This course is for both beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! There are currently over a million Cyber Security job openings globally, and demand is greatly outpacing supply – which means more opportunity, job security, and higher pay for you!

What is Recon and Footprinting?

Footprinting and Recon (Reconnaissance) go hand-in-hand in terms of cyber security. The attack surface of a system, network, or organization is referred to as the footprint. Determining that footprint and covertly collecting information on the target is referred to as recon. The process of footprinting and recon is often used early in an attack by penetration testers.



1. Recon and Footprinting

Website and E-Mail Footprinting (4:11)
Port Inspection with Netstat (3:03)
Nmap and Metasploit (2:32)
Maltego (5:24)
Who is and Nslookup (3:06)
Shodan and IoT Enumeration (3:22)
NTP Enumeration (1:16)
Probing SNMP (2:25)
Inspecting SMTP (0:35)
SMB Discovery (2:04)
Commonly used network ports and protocols (14:06)

Shopping Basket