Ethical Hacking - Phase 1 - Reconnaissance
Requirements
- Basic IT Skill, Example: Being able to use a computer device at a beginner level.
- Good computer with at least 4GB RAM and reliable internet connection
- Require patience and time to spend on this course.
Description
Kali is a penetration testing Linux distribution created by Offensive Security. It holds a repository of multiple tools for security-related engineers including hacking wireless networks, web applications, databases, Reverse engineering, password crackers, and much more! As you can see, Kali is a versatile and powerful tool for anyone looking to do any cybersecurity-related work.
Keep in mind this is a basics course, which means this course is a beginner’s guide Ethical Hacking - Phase 1 – Reconnaissance. We will cover Active and Passive techniques, and the tools used to perform the information gathering and reconnaissance. The main purpose of information Gathering is getting to know the target systems. This is the first process in ethical hacking. Reconnaissance is a set of processes and techniques (Footprinting, Scanning & Enumeration) used to covertly discover and collect information about a target system.
The course is broken into three main sections, and an introduction section, and we wrap up with a project to ensure you understand the process of information gathering and reconnaissance. The goal is to provide you with basic knowledge to get you started so you can take it from there. Remember this is not a field that you have can walkthrough. You will have to grow and adapt as the environment changes.
Remember this is a basic overview of information gathering and reconnaissance, the hope is you get in, understand the principles. Work through the assignments and exercises to help solidify your understanding of the topics covered in this course.
Who this course is for:
- Anybody who want to learn about Ethical Hacking reconnaissance techniques
- Any person willing to learn how to make their own penetration testing lab
Instructor
Hello, my name is Arthur Salmon, currently I hold an Applied Doctorate in Information Assurance & Cybersecurity. I hold a Master’s degree in network and Communication Management focusing on IT Security. I have worked in IT for 20 years, with 10 of them being in an IT Security role. I have spent 6 years doing red-team work for private organizations, and just over 5 doing blue-team work for medium businesses. While my primary job role is in education, I spend allot of time working in the field and moving cybersecurity industry forward as a whole. I hold advanced certifications such as CISSP, CEH, and several Cisco CCNPs. I have also worked internally working to update Cybersecurity programs, courses and training facilities to aid in their modernization. Currently, I am working on coordinating western regional colleges into a more competition focus pathway as well as aiding in the development of competency-based assessments in Cybersecurity curriculum. When I am not working on aiding in education development, I own and operate a MSP in the greater Las Vegas area aiding small/medium business in meeting compliance and regulatory requirements.