Ethical Hacking - Footprinting and Reconnaissance
What you'll learn
- Certified Ethical Hacker (CEH) Preparation - Hacker Activity with Footprinting and Reconnaissance
Requirements
- Understanding computer use and the Windows operating system.
Description
In this course the student will have a first contact with techniques of Footprinting and Reconnaissance, which is considered the first step of the hacker activity. It addresses issues such as IP address, VPN, TOR and anonymous browsing, anonymous email / email tracking, browsing anonymity, ping and tracert commands, Deep Web, legal and criminal issues, google hacking (dorking) , financial information, among others.
Who this course is for:
- Beginners and laymen in computing.
Course content
- Preview18:39
- 10:44Footprinting as a Method.
- 08:18What does footprinting look for?
Instructor
Mestre em Física Aplicada, Professor de Matemática e Física, Consultor Jurídico, MBA em Finanças de Mercado e Ethical Hacker.
Participou do Treinamento Oficial do CEH (Certified Ethical Hacker) em 2016.
É professor de Matemática, Estatística, Física, Direito e outras disciplinas em instituições educacionais públicas e privadas, e também trabalha com consultoria para pessoas e empresas.
ENGLISH:
Master in Applied Physics, Professor of Mathematics and Physics, Legal Consultant, MBA in Market Finance and Ethical Hacker. Participated in the CEH (Certified Ethical Hacker) Official Training in 2016. He teaches Mathematics, Statistics, Physics and other disciplines in public and private educational institutions, and also works with consulting services for individuals and companies.