Conducting Reconnaissance for Cybersecurity
- Offered byEC-Council
Conducting Reconnaissance for Cybersecurity at EC-Council Overview
Conducting Reconnaissance for Cybersecurity
at EC-Council
Enhancing ability to gather critical intelligence in the early stages of cybersecurity operations
Duration | 12 hours |
Mode of learning | Online |
Official Website | Go to Website |
Credential | Certificate |
Conducting Reconnaissance for Cybersecurity at EC-Council Highlights
Conducting Reconnaissance for Cybersecurity
at EC-Council
- Earn a certificate after completion of the course
- Quizzes & Assessments for practice
Conducting Reconnaissance for Cybersecurity at EC-Council Course details
Conducting Reconnaissance for Cybersecurity
at EC-Council
Skills you will learn
What are the course deliverables?
- Learn Reconnaissance
- Learn New Tools
- Hosted Environments
- Content Delivery Networks
- Outsourced DNS
- Domain Controllers
- Print Servers
- Learn to Conduct Testing
- Prevent Database Misconfigurations
More about this course
- This course provides a comprehensive exploration of reconnaissance methodologies, tools, and techniques used to gather intelligence about potential targets, identify vulnerabilities, and assess the overall security posture of systems and networks
- This course equips participants with practical skills highly sought after in cybersecurity roles such as ethical hacking, penetration testing, and threat intelligence analysis
Conducting Reconnaissance for Cybersecurity at EC-Council Curriculum
Conducting Reconnaissance for Cybersecurity
at EC-Council
Mastering Web and Infrastructure Reconnaissance
Intro and Setup
Simple but Effective Google Tricks
OSINT via LinkedIn Trawling
DNS Based Reconnaissance, Simple to Extreme
Network Scanning
What is the Website made of
Introduction to Server Technologies
Recon from the Inside
Mastering Database Reconnaissance and Exploitation
Installation and Setup
Introduction to Database
Difference Between SQL and NoSQL Databases
Pentesting Test Cases for SQL and NoSQL
Exploiting Databases for Fun and Profit
Privilege Escalation and Chaining Attacks
Database Vulnerability and Misconfiguration Mitigation Techniques
Course Conclusion and Final Comments
Conducting Reconnaissance for Cybersecurity at EC-Council Faculty details
Conducting Reconnaissance for Cybersecurity
at EC-Council
Skylar Simmons
Michael Smith
Other courses offered by EC-Council
Conducting Reconnaissance for Cybersecurity
at EC-Council
Student Forum
Anything you would want to ask experts?
Write here...