Complete Ethical Hacking Series: Recon and Footprinting
0.0 (0 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
3 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Complete Ethical Hacking Series: Recon and Footprinting to your Wishlist.

Add to Wishlist

Complete Ethical Hacking Series: Recon and Footprinting

Complete Ethical Hacking Series (CEHv9): Reconnaissance and Footprinting
0.0 (0 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
3 students enrolled
Created by Chad Russell
Last updated 7/2017
English
Current price: $10 Original price: $20 Discount: 50% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 43 mins on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Pass the components of the Certified Ethical Hacker Exam v9 pertaining to reconnaissance and footprinting.
  • Collect and enumerate target information for pen testing purposes.
View Curriculum
Requirements
  • Students should have a working understanding of TCP/IP and networking concepts.
Description


Complete Ethical Hacking Series:  Recon and Footprinting

This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures!    Each chapter closes with exercises putting your new learned skills into practical use immediately.

What are the pre-requisites for this course?

  1. Students should have a working understanding of TCP/IP and networking concepts. 

What will you be able to do after taking this course?

  • Port inspection with Netstat - In computing, netstat (network statistics) is a command-line network utility tool that displays network connections for the Transmission Control Protocol (both incoming and outgoing), routing tables, and a number of network interfaces. 
  • Metasploit and Nmap - Nmap features include:
    • Host discovery – Identifying hosts on a network. For example, listing the hosts that respond to TCP and/or ICMP requests or have a particular port open.
    • Port Scanning – Enumerating the open ports on target hosts.
    • Version detection – Interrogating network services on remote devices to determine application name and version number.
    • OS Detection – Determining the operating system and hardware characteristics of network devices.
    • Scriptable interaction with the target – using Nmap Scripting Engine (NSE) and Lua programming language.
  • Visual mapping and rendering with Maltego - Maltego focuses on providing a library of transforms for discovery of data from open sources, and visualizing that information in a graph format, suitable for link analysis and data mining. 
  • Whois and Nslookup - nslookup is a network administration command line  tool available for many computer operating systems  for querying the (DNS) to obtain domain name or IP address mapping or for any other specific DNS Record. 
  • IoT enumeration and discovery with Shodan - Shodan is a search engine that lets the user find specific types of computers (web cams, routers, servers, etc.) connected to the internet using a variety of filters.
  • Enumerating the Network Time Protocol - 
  • SNMP foot printing - Simple Network Management Protocol (SNMP) is a popular protocol for network management. It is used for collecting information from, and configuring, network devices, such as servers, printers, hubs, switches, and routers on an Internet Protocol (IP) network.


  • SMTP enumeration - SMTP is a service that can be found in most infrastructure penetration tests.This service can help the penetration tester to perform username enumeration via the EXPN and VRFY commands if these commands have not been disabled by the system administrator.
  • Enumerating and hacking the Server Message Block protocol - Ransomware attacks such as Wannacry and Petya have used vulnerabilities in the SMB protocol to automatically spread across networks via SMB file shares. 



Who is the target audience?
  • This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you! Each chapter closes with exercises putting your new learned skills into practical use immediately.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
+
Complete Ethical Hacking Series: Recon and Footprinting
11 Lectures 42:39




Whois and Nslookup
03:06

Shodan and IoT Enumeration
03:22

NTP Enumeration
01:16

Enumerating SNMP
02:25

SMTP Enumeration
00:35

SMB Discovery
02:04

Commonly used network ports and protocols
14:41
About the Instructor
Chad Russell
3.6 Average rating
1,041 Reviews
16,792 Students
24 Courses
Join the Cyber Security Industry in 2016!

Instructor Bio – Chad Russell

Join the Cyber Security Industry in 2017!

If you are interested in starting a career in the Cyber Security Industry 2016 is the time! 

Learning the fundamentals of Cyber Security provides you with  a powerful and very useful set of skills.  Study Penetration Testing and Ethical Hacking and learn to think like a hacker so you can better defend your networks and data.   

Jobs in Cyber Security are plentiful, and getting Security+ Certified will give you a strong background to more easily pick up and tackle more advanced exams such as the Certified Ethical Hacker and CISSP certifications.  

Get certified and land an entry level Cyber Security position paying upwards of six figures!  There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you!   

But, don't take my word for it...please take a look at the FREE previews (they are available in all my courses) and see for yourself.  This year I have partnered with webofsecurity.com, a premier provider of ‘All Things Information Security’ to bring you a fantastic suite of Cyber Security certification training to help you get into the hottest industry in IT. 

About me:

Hello, I’m Chad Russell.  I’ve been in the CyberSecurity industry for over 15 years.  I’ve taught Microsoft Engineering courses as a Certified trainer, I’ve managed teams of security engineers and analysts for an internet banking provider, I’ve been an information security consultant working for companies including SAP, Microsoft and Oracle.   

I lead and conduct 'Security Risk Assessments' for customers throughout North America with an emphasis on cloud security, identity governance, network security, social engineering, mobile security, breach assessments, database security and access management.  

Over the past 15 years I've held numerous certifications including CISSP, CCNP, MCSE and MCDBA certifications and have a B.S. in Computer Science from Excelsior College  I can help you get certified and get ahead!